Sciweavers

2747 search results - page 481 / 550
» Network externalities in software systems
Sort
View
SAC
2009
ACM
14 years 3 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
DSN
2009
IEEE
14 years 3 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis
DSN
2009
IEEE
14 years 3 months ago
LFI: A practical and general library-level fault injector
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
Paul Dan Marinescu, George Candea
IEEEARES
2008
IEEE
14 years 3 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
AINA
2007
IEEE
14 years 3 months ago
Un-biasing the Link Farm Effect in PageRank Computation
Link analysis is a critical component of current Internet search engines' results ranking software, which determines the ordering of query results returned to the user. The o...
Arnon Rungsawang, Komthorn Puntumapon, Bundit Mana...