Sciweavers

1411 search results - page 246 / 283
» Performance analysis of BitTorrent-like systems with heterog...
Sort
View
CSE
2009
IEEE
14 years 3 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
DSS
2007
79views more  DSS 2007»
13 years 9 months ago
Leveraging Question Answer technology to address terrorism inquiry
This paper investigates the potential use of dialog-based ALICEbots in disseminating terrorism information to the general public. In particular, we study the acceptance and respon...
Robert P. Schumaker, Hsinchun Chen
ACSAC
2010
IEEE
13 years 7 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CCS
2006
ACM
14 years 23 days ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
DGO
2004
108views Education» more  DGO 2004»
13 years 10 months ago
A Project to Assess Voting Technology and Ballot Design
The interdisciplinary project uses a variety of research designs, data collection methodologies, and analysis techniques and two ballot designs to assess five commercially availab...
Paul S. Herrnson, Richard G. Niemi, Benjamin B. Be...