Sciweavers

1663 search results - page 85 / 333
» Computer Security in the Real World
Sort
View
JUCS
2010
150views more  JUCS 2010»
13 years 7 months ago
Multi-criteria Group Decision Support with Linguistic Variables in Long-term Scenarios for Belgian Energy Policy
: Real world decisions often made in the presence of multiple, conflicting, and incommensurate criteria. Decision making requires multiple perspectives of different individuals as ...
Da Ruan, Jie Lu, Erik Laes, Guangquan Zhang, Jun M...
PERCOM
2010
ACM
13 years 7 months ago
DogSim: A state chart simulator for Domotic Environments
—Smart Homes and Domotic Environments are promising to revolutionize the daily human life providing users with increased care, adaptability and safety. However, to fully exploit ...
Dario Bonino, Fulvio Corno
PPSN
2010
Springer
13 years 6 months ago
Benchmarking Evolutionary Algorithms: Towards Exploratory Landscape Analysis
We present methods to answer two basic questions that arise when benchmarking optimization algorithms. The first one is: which algorithm is the `best' one? and the second one:...
Olaf Mersmann, Mike Preuss, Heike Trautmann
WWW
2010
ACM
14 years 3 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
CSFW
2005
IEEE
14 years 2 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers