Sciweavers

2270 search results - page 31 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
AI
2011
Springer
13 years 3 months ago
The extended global cardinality constraint: An empirical survey
The Extended Global Cardinality Constraint (EGCC) is a vital component of constraint solving systems, since it is very widely used to model diverse problems. The literature contai...
Peter Nightingale
SIGIR
2002
ACM
13 years 8 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny

Publication
194views
15 years 7 months ago
A Survey of Application Layer Techniques for Adaptive Streaming of Multimedia
The current Internet only supports best-effort traffic. New high-speed technologies such as ATM (asynchronous transfer mode), gigabit Ethernet, fast Ethernet, and frame relay, have...
Bobby Vandalore, Wu-chi Feng, Raj Jain, Sonia Fahm...
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 24 days ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
IMC
2005
ACM
14 years 2 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer