Sciweavers

1619 search results - page 117 / 324
» Important Moments in Systems and Control
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
HICSS
2002
IEEE
129views Biometrics» more  HICSS 2002»
14 years 2 months ago
Implementing ERP Systems in China
This paper reports the findings of an exploratory study of R/3 users in China which was conducted in Spring 2000. The broad purpose of the study is to identify crucial implementat...
Kai Reimers
SACMAT
2006
ACM
14 years 3 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
CAV
2009
Springer
165views Hardware» more  CAV 2009»
14 years 9 months ago
Symbolic Counter Abstraction for Concurrent Software
Counter Abstraction for Concurrent Software G?erard Basler1 , Michele Mazzucchi1 , Thomas Wahl1,2 , Daniel Kroening1,2 1 Computer Systems Institute, ETH Zurich, Switzerland 2 Compu...
Daniel Kroening, Gérard Basler, Michele Maz...
ICALP
2009
Springer
14 years 9 months ago
Functional Monitoring without Monotonicity
The notion of distributed functional monitoring was recently introduced by Cormode, Muthukrishnan and Yi [CMY08] to initiate a formal study of the communication cost of certain fu...
Chrisil Arackaparambil, Joshua Brody, Amit Chakrab...