Sciweavers

739 search results - page 142 / 148
» Information Flow in Credential Systems
Sort
View
CHI
2005
ACM
14 years 8 months ago
Tuning and testing scrolling interfaces that automatically zoom
Speed dependent automatic zooming (SDAZ) is a promising refinement to scrolling in which documents are automatically zoomed-out as the scroll rate increases. By automatically zoom...
Andy Cockburn, Joshua Savage, Andrew Wallace
EUROSYS
2009
ACM
14 years 4 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
SACMAT
2005
ACM
14 years 1 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
ECIS
2004
13 years 9 months ago
Forecasting ERP implementation success - Towards a grounded framework
The continuing soar in popularity when it comes to standardized information systems sold en masse under the labelling of Enterprise Resource Planning (ERP) Systems is somewhat kep...
Johan Magnusson, Andreas Nilsson, Fredrik Carlsson
HPDC
2010
IEEE
13 years 8 months ago
Data parallelism in bioinformatics workflows using Hydra
Large scale bioinformatics experiments are usually composed by a set of data flows generated by a chain of activities (programs or services) that may be modeled as scientific work...
Fábio Coutinho, Eduardo S. Ogasawara, Danie...