Sciweavers

468 search results - page 57 / 94
» Computationally Feasible Automated Mechanism Design: General...
Sort
View
CODASPY
2011
13 years 11 hour ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
SIGCOMM
2004
ACM
14 years 1 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
CSCW
2006
ACM
14 years 2 months ago
Context-aware telephony: privacy preferences and sharing patterns
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with cont...
Ashraf Khalil, Kay Connelly
MMNS
2007
105views Multimedia» more  MMNS 2007»
13 years 10 months ago
Monitoring Flow Aggregates with Controllable Accuracy
In this paper, we show the feasibility of real-time flow monitoring with controllable accuracy in today’s IP networks. Our approach is based on Netflow and A-GAP. A-GAP is a prot...
Alberto Gonzalez Prieto, Rolf Stadler
CSCW
2006
ACM
14 years 2 months ago
Where's the "party" in "multi-party"?: analyzing the structure of small-group sociable talk
Spontaneous multi-party interaction – conversation among groups of three or more participants – is part of daily life. While automated modeling of such interactions has receiv...
Paul M. Aoki, Margaret H. Szymanski, Luke D. Plurk...