Sciweavers

1663 search results - page 86 / 333
» Computer Security in the Real World
Sort
View
CHI
2009
ACM
14 years 9 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
ICCSA
2009
Springer
14 years 3 months ago
Towards Location-Based Real-Time Monitoring Systems in u-LBS
Recently, ubiquitous location-based services (u-LBS) has been utilized in a variety of practical and mission-critical applications such as security services, personalization servic...
MoonBae Song, Hyunseung Choo
SLS
2009
Springer
224views Algorithms» more  SLS 2009»
14 years 3 months ago
High-Performance Local Search for Solving Real-Life Inventory Routing Problems
Abstract. In this paper, a real-life routing and scheduling problem encountered is addressed. The problem, which consists in optimizing the delivery of fluids by tank trucks on a ...
Thierry Benoist, Bertrand Estellon, Fréd&ea...
ADHOCNOW
2008
Springer
13 years 10 months ago
A Novel Mobility Model from a Heterogeneous Military MANET Trace
In this paper we describe our analysis of a real trace and propose a mobility model. The trace data we used for this study was collected from a military experiment carried out in L...
Xiaofeng Lu, Yung-chih Chen, Ian X. Y. Leung, Zhan...
CHI
2006
ACM
14 years 9 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel