Sciweavers

2440 search results - page 460 / 488
» Data-Intensive Question Answering
Sort
View
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
13 years 12 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
SIGUCCS
2000
ACM
13 years 12 months ago
There is No Such Thing as Free Support
Every campus department needs computer support, from ordering and setting up new computers to installing software and answering software questions. This is in addition to training...
Dianne Brotherson
SIGUCCS
2000
ACM
13 years 12 months ago
Ills Cured with a Dose of Remedy
We presented a paper in Denver that addressed our Remedy design process. At that time we talked about our current development process, but we hadn't implemented the product a...
Michael Critchfield, Michael Murray
CRYPTO
2000
Springer
149views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
A Cryptographic Solution to a Game Theoretic Problem
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Yevgeniy Dodis, Shai Halevi, Tal Rabin
STOC
2010
ACM
170views Algorithms» more  STOC 2010»
13 years 12 months ago
Connectivity oracles for failure prone graphs
Dynamic graph connectivity algorithms have been studied for many years, but typically in the most general possible setting, where the graph can evolve in completely arbitrary ways...
Ran Duan, Seth Pettie