Sciweavers

401 search results - page 63 / 81
» Dynamic security context management in Grid-based applicatio...
Sort
View
DAWAK
2008
Springer
13 years 9 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi
ICWSM
2008
13 years 9 months ago
Space Planning for Online Community
Several years of consulting with online community hosts and managers have highlighted a variety of issues that recur across many online community development efforts. We summarize...
Danyel Fisher, Tammara Combs Turner, Marc A. Smith
ETFA
2008
IEEE
14 years 2 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth
COMSWARE
2007
IEEE
14 years 1 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 10 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu