Sciweavers

499 search results - page 91 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
ACSC
2005
IEEE
14 years 1 months ago
A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies
Curriculum based on internetworking devices is primarily based on the Command Line Interface (CLI) and case studies. However a single CLI command may produce output that is not on...
Stanislaw P. Maj, G. Kohli, T. Fetherston
CODASPY
2012
12 years 3 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
PLDI
2009
ACM
14 years 2 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
JOCN
2010
123views more  JOCN 2010»
13 years 2 months ago
Human Brain Dynamics Accompanying Use of Egocentric and Allocentric Reference Frames during Navigation
Maintaining spatial orientation while travelling requires integrating spatial information encountered from an egocentric viewpoint with accumulated information represented within ...
Klaus Gramann, Julie Onton, Davide Riccobon, Herma...
ARCS
2009
Springer
14 years 2 months ago
Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture
The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software c...
Joseph Gebis, Leonid Oliker, John Shalf, Samuel Wi...