Sciweavers

282 search results - page 47 / 57
» Private Policy Negotiation
Sort
View
SAC
2009
ACM
14 years 1 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
POS
1998
Springer
13 years 11 months ago
Optimizing the Read and Write Barriers for Orthogonal Persistence
Persistent programming languages manage volatile memory as a cache for stable storage, imposing a read barrier on operations that access the cache, and a write barrier on updates ...
Antony L. Hosking, Nathaniel Nystrom, Quintin I. C...
IESA
2007
13 years 9 months ago
UN/CEFACT Core Components as the basis for structured business communication by SMEs, employing auto-generated, user adjustable
In this paper a methodology is presented to generate webforms for business documents directly from XML schemas. XML Schemas that are based on the UN/CEFACT Naming and Design Rules ...
Fred van Blommestein, Bertjan Broeksema
ECIS
2001
13 years 8 months ago
Towards sustainable quality of service in interconnection agreements: Implications from information asymmetry
This paper analyses the structure of the Internet marketplace and the business relationships of key players involved in network services provision. A brief overview of existing pr...
Ioanna D. Constantiou, Nikolaos A. Mylonopoulos
AAAI
1994
13 years 8 months ago
Learning to Coordinate without Sharing Information
Researchers in the eld of Distributed Arti cial Intelligence (DAI) have been developing e cient mechanisms to coordinate the activities of multiple autonomous agents. The need for...
Sandip Sen, Mahendra Sekaran, John Hale