Sciweavers

2270 search results - page 31 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
127
Voted
AI
2011
Springer
14 years 10 months ago
The extended global cardinality constraint: An empirical survey
The Extended Global Cardinality Constraint (EGCC) is a vital component of constraint solving systems, since it is very widely used to model diverse problems. The literature contai...
Peter Nightingale
147
Voted
SIGIR
2002
ACM
15 years 3 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
227
Voted

Publication
194views
17 years 1 months ago
A Survey of Application Layer Techniques for Adaptive Streaming of Multimedia
The current Internet only supports best-effort traffic. New high-speed technologies such as ATM (asynchronous transfer mode), gigabit Ethernet, fast Ethernet, and frame relay, have...
Bobby Vandalore, Wu-chi Feng, Raj Jain, Sonia Fahm...
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 7 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
123
Voted
IMC
2005
ACM
15 years 9 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer