Sciweavers

160 search results - page 21 / 32
» Mining Traces of Large Scale Systems
Sort
View
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
14 years 3 days ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
WWW
2006
ACM
14 years 9 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
HICSS
1999
IEEE
97views Biometrics» more  HICSS 1999»
14 years 1 months ago
The Ragnarok Architectural Software Configuration Management Model
The architecture is the fundamental framework for designing and implementing large scale software, and the ability to trace and control its evolution is essential. However, many t...
Henrik Bærbak Christensen
LWA
2007
13 years 10 months ago
Conceptual Clustering of Social Bookmarking Sites
Abstract: Currently, social bookmarking systems provide intuitive support for browsing locally their content. A global view is usually presented by the tag cloud of the system, but...
Miranda Grahl, Andreas Hotho, Gerd Stumme
ACSAC
2005
IEEE
14 years 2 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...