Sciweavers

6050 search results - page 1126 / 1210
» Information In The Non-Stationary Case
Sort
View
SAC
2006
ACM
14 years 2 months ago
Semantic analysis of web site audience
With the emergence of the World Wide Web, analyzing and improving Web communication has become essential to adapt the Web content to the visitors’ expectations. Web communicatio...
Jean-Pierre Norguet, Esteban Zimányi, Ralf ...
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SASN
2006
ACM
14 years 2 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...
ACSC
2005
IEEE
14 years 2 months ago
A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies
Curriculum based on internetworking devices is primarily based on the Command Line Interface (CLI) and case studies. However a single CLI command may produce output that is not on...
Stanislaw P. Maj, G. Kohli, T. Fetherston
DASFAA
2005
IEEE
106views Database» more  DASFAA 2005»
14 years 2 months ago
Real Datasets for File-Sharing Peer-to-Peer Systems
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signi...
Shen-Tat Goh, Panos Kalnis, Spiridon Bakiras, Kian...
« Prev « First page 1126 / 1210 Last » Next »