Sciweavers

985 search results - page 112 / 197
» On the validity of digital signatures
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 10 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
13 years 11 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
HICSS
2012
IEEE
265views Biometrics» more  HICSS 2012»
12 years 5 months ago
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
The advent of the smartphone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and ...
David Tilson, Carsten Sørensen, Kalle Lyyti...
ISSTA
2012
ACM
12 years 17 days ago
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say
A static analysis design is sufficient if it can prove the property of interest with an acceptable number of false alarms. Ultimately, the only way to confirm that an analysis d...
Devin Coughlin, Bor-Yuh Evan Chang, Amer Diwan, Je...
ESANN
2008
13 years 11 months ago
A method for robust variable selection with significance assessment
Our goal is proposing an unbiased framework for gene expression analysis based on variable selection combined with a significance assessment step. We start by discussing the need ...
Annalisa Barla, Sofia Mosci, Lorenzo Rosasco, Ales...