Sciweavers

1006 search results - page 100 / 202
» Better control on recommender systems
Sort
View
SDMW
2005
Springer
14 years 1 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
WRAC
2005
Springer
14 years 1 months ago
Harnessing Self-modifying Code for Resilient Software
In this paper we argue that self-modifying code can become a better strategy for realizing long-lived autonomous software systems than static code, regardless how well it was valid...
Christian F. Tschudin, Lidia Yamamoto
JSS
2002
63views more  JSS 2002»
13 years 8 months ago
Strategies for resolving inter-class data conflicts in mixed real-time database systems
Although many efficient concurrency control protocols have been proposed for real-time database systems, they are mainly designed for the systems with a single type of real-time t...
Kam-yiu Lam, Tei-Wei Kuo, Tony S. H. Lee
SISW
2005
IEEE
14 years 1 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
RTSS
2000
IEEE
14 years 19 days ago
Scalable Real-Time System Design using Preemption Thresholds
The maturity of schedulabilty analysis techniquesfor fired-prioritypreemptive scheduling has enabled the consideration of timing issues at design time using a specification of the...
Manas Saksena, Yun Wang