Sciweavers

1627 search results - page 235 / 326
» On context in authorization policy
Sort
View
ICUMT
2009
13 years 6 months ago
Multipath at the transport layer: An end-to-end resilience mechanism
Abstract--As society's dependence on network technology increases, the need for resilience and survivability in these services becomes increasingly apparent. Since the user ex...
Justin P. Rohrer, Ramya Naidu, James P. G. Sterben...
WWW
2011
ACM
13 years 3 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
HICSS
2012
IEEE
308views Biometrics» more  HICSS 2012»
12 years 4 months ago
Understanding Smart Cities: An Integrative Framework
Making a city “smart” is emerging as a strategy to mitigate the problems generated by the urban population growth and rapid urbanization. Yet little academic research has spar...
Hafedh Chourabi, Taewoo Nam, Shawn Walker, Jos&eac...
WWW
2009
ACM
14 years 9 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
EDBT
2008
ACM
144views Database» more  EDBT 2008»
14 years 9 months ago
BI batch manager: a system for managing batch workloads on enterprise data-warehouses
Modern enterprise data warehouses have complex workloads that are notoriously difficult to manage. An important problem in workload management is to run these complex workloads `o...
Abhay Mehta, Chetan Gupta, Umeshwar Dayal