Sciweavers

7886 search results - page 94 / 1578
» An evaluation of bipartitioning techniques
Sort
View
NDSS
2005
IEEE
14 years 2 months ago
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Most Windows users run all the time with Admin privileges. This significantly increases the vulnerability of Windows systems because the compromise of any user-level application ...
Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wa...
ATAL
2005
Springer
14 years 2 months ago
Simulating data dissemination techniques for local reputation systems
In distributed scenarios the robustness of a reputation mechanism depends on the data available for computation. Especially in ad-hoc networks the amount of available data is rest...
Andreas Schlosser, Marco Voss
KR
2004
Springer
14 years 2 months ago
Optimization Techniques for Retrieving Resources Described in OWL/RDF Documents: First Results
Practical description logic systems play an ever-growing role for knowledge representation and reasoning research even in distributed environments. In particular, the often-discus...
Volker Haarslev, Ralf Möller
CIKM
2003
Springer
14 years 2 months ago
The power-method: a comprehensive estimation technique for multi-dimensional queries
Existing estimation approaches for multi-dimensional databases often rely on the assumption that data distribution in a small region is uniform, which seldom holds in practice. Mo...
Yufei Tao, Christos Faloutsos, Dimitris Papadias
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
14 years 2 months ago
Achieving Software Flexibility via Intelligent Workflow Techniques
In this paper, we investigate innovative techniques of achieving software flexibility in a workflow environment. We believe that by incorporating workflow technology and intellige...
Daniel Dajun Zeng, J. Leon Zhao