Sciweavers

2372 search results - page 289 / 475
» Probabilistic calling context
Sort
View
POLICY
2004
Springer
14 years 1 months ago
Security Policy Reconciliation in Distributed Computing Environments
A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The proces...
Hao Wang, Somesh Jha, Miron Livny, Patrick Drew Mc...
ER
2003
Springer
150views Database» more  ER 2003»
14 years 1 months ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...
EUROCRYPT
2003
Springer
14 years 1 months ago
Cryptanalysis of the EMD Mode of Operation
Abstract. In this paper, we study the security of the Encrypt-MaskDecrypt mode of operation, also called EMD, which was recently proposed for applications such as disk-sector encry...
Antoine Joux
CSCW
2000
ACM
14 years 16 days ago
Evolution of Contact Point: a case study of a help desk and its users
This paper describes the evolution of a concept, Contact Point, the research process through which it evolved, and the work context and practices which drove its evolution. Contac...
Lena Mamykina, Catherine G. Wolf
COORDINATION
2000
Springer
14 years 16 days ago
Law-Governed Internet Communities
We consider the problem of coordination and control of large heterogeneous groups of agents distributed over the Internet in the context of Law-Governed Interaction (LGI) [2, 5]. L...
Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen, Victor...