Sciweavers

11016 search results - page 2110 / 2204
» Digital Information Retrieval
Sort
View
WMASH
2004
ACM
14 years 3 months ago
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services bas...
Ankur Agiwal, Parakram Khandpur, Huzur Saran
CCS
2004
ACM
14 years 3 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
CCS
2004
ACM
14 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
CCS
2004
ACM
14 years 3 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
CIKM
2004
Springer
14 years 3 months ago
Organizing structured web sources by query schemas: a clustering approach
In the recent years, the Web has been rapidly “deepened” with the prevalence of databases online. On this deep Web, many sources are structured by providing structured query i...
Bin He, Tao Tao, Kevin Chen-Chuan Chang
« Prev « First page 2110 / 2204 Last » Next »