Sciweavers

978 search results - page 48 / 196
» Developing a Common Operating Environment for Military Appli...
Sort
View
NSDI
2007
15 years 6 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
ICAI
2008
15 years 5 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
IC
2004
15 years 5 months ago
Personal Assistant: A Case Study on Web Service vs. Web Based Application
ct Non-blocking operation based on pre-determined schedule has many applications. We have created a Personal Assistant system that is able to send out email notification according ...
Guoliang Qian, Jing Zou, Bon K. Sy
173
Voted
ICN
2009
Springer
15 years 8 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
15 years 10 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...