Sciweavers

396 search results - page 47 / 80
» Argument Controlled Profiling
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 12 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
SOCRATES
2008
151views Education» more  SOCRATES 2008»
13 years 9 months ago
Learning Translation Strategies in a CSCL Framework
This study investigated the extent to which the social constructivist approach can be applied to the teaching/learning of translation strategies in an e-learning environment. To a...
Viviana Gaballo
EGOV
2010
Springer
13 years 8 months ago
From Policy-Making Statements to First-Order Logic
Within a framework for enriched on-line discussion forums for e-government policy-making, pro and con statements for positions are input, structurally related, then logically repre...
Adam Wyner, Tom M. van Engers, Kiavash Bahreini
IJUFKS
2002
78views more  IJUFKS 2002»
13 years 7 months ago
On the Security of Microaggregation with Individual Ranking: Analytical Attacks
Microaggregation is a statistical disclosure control technique. Raw microdata (i.e. individual records) are grouped into small aggregates prior to publication. With fixed-size grou...
Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Anna...
GLOBECOM
2010
IEEE
13 years 5 months ago
A Dynamic Framed ALOHA Scheme for Batch Resolution in Practical CSMA-Based Wireless Networks
Abstract--The batch resolution problem consists in arbitrating the channel access of a group of nodes in a wireless network in order to collect a single packet from each node in th...
Andrea Zanella