Sciweavers

1818 search results - page 150 / 364
» How users use access control
Sort
View
DM
2006
63views more  DM 2006»
13 years 9 months ago
Efficient crossover designs for comparing test treatments with a control treatment
Within a large family of crossover designs this paper characterizes the mathematical structures of A-optimal and A-efficient crossover designs for the purpose of statistical compa...
A. Sadam Hedayat, Min Yang
ESORICS
2011
Springer
12 years 9 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
PDCN
2004
13 years 11 months ago
Quality-of-service provisioning system for multimedia transmission in IEEE 802.11 wireless lans
IEEE 802.11, the standard of wireless local area networks (WLANs), allows the coexistence of asynchronous and time-bounded traffic using the distributed coordination function (DCF)...
Joseph Deng, Hsu-Chun Yen
IEEEPACT
1999
IEEE
14 years 1 months ago
Memory System Support for Image Processing
Image processing applications tend to access their data non-sequentially and reuse that data infrequently. As a result, they tend to perform poorly on conventional memory systems ...
Lixin Zhang, John B. Carter, Wilson C. Hsieh, Sall...
CIKM
1994
Springer
14 years 1 months ago
Analytical Version Control Management in a Hypertext System
may be saved for later reuse of material, but also to preserve the historical perspective of work done [ha:92]. In particular, in distributed and collaborative hypertext systems, v...
Antonina Dattolo, Antonio Gisolfi