Sciweavers

4184 search results - page 830 / 837
» Names of Our Lives
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
TKDE
2010
251views more  TKDE 2010»
13 years 2 months ago
Exploring Correlated Subspaces for Efficient Query Processing in Sparse Databases
The sparse data is becoming increasingly common and available in many real-life applications. However, relative little attention has been paid to effectively model the sparse data ...
Bin Cui, Jiakui Zhao, Dongqing Yang
TKDE
2010
197views more  TKDE 2010»
13 years 2 months ago
Filtering Data Streams for Entity-Based Continuous Queries
The idea of allowing query users to relax their correctness requirements in order to improve performance of a data stream management system (e.g., location-based services and senso...
Reynold Cheng, Benjamin C. M. Kao, Alan Kwan, Suni...
TON
2010
210views more  TON 2010»
13 years 2 months ago
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
Abstract-- Security issues and attack management in transparent WDM (Wavelength Division Multiplexing) optical networks has become of prime importance to network operators due to t...
Nina Skorin-Kapov, J. Chen, Lena Wosinska
TR
2010
158views Hardware» more  TR 2010»
13 years 2 months ago
Multi-Objective Approaches to Optimal Testing Resource Allocation in Modular Software Systems
Software testing is an important issue in software engineering. As software systems become increasingly large and complex, the problem of how to optimally allocate the limited test...
Zai Wang, Ke Tang, Xin Yao