Sciweavers

1062 search results - page 180 / 213
» Models and Languages for Overlay Networks
Sort
View
WWW
2005
ACM
14 years 11 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
ICALP
2009
Springer
14 years 10 months ago
Towards a Study of Low-Complexity Graphs
Abstract. We propose the study of graphs that are defined by lowcomplexity distributed and deterministic agents. We suggest that this viewpoint may help introduce the element of in...
Sanjeev Arora, David Steurer, Avi Wigderson
CISIS
2008
IEEE
14 years 4 months ago
Java and the Power of Multi-Core Processing
The new era of multi-core processing challenges software designers to efficiently exploit the parallelism that is now massively available. Programmers have to exchange the conven...
Peter Bertels, Dirk Stroobandt
ESCIENCE
2006
IEEE
14 years 4 months ago
A Middleware Framework for Maximum Likelihood Evaluation over Dynamic Grids
We have designed a maximum likelihood fitter using the actor model to distribute the computation over a heterogeneous network. The prototype implementation uses the SALSA program...
Wei-Jen Wang, Kaoutar El Maghraoui, John Cummings,...
ICTAC
2005
Springer
14 years 3 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...