Sciweavers

792 search results - page 45 / 159
» Reading What Machines
Sort
View
SACMAT
2005
ACM
15 years 10 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
CLOUD
2010
ACM
15 years 9 months ago
Differential virtual time (DVT): rethinking I/O service differentiation for virtual machines
This paper investigates what it entails to provide I/O service differentiation and performance isolation for virtual machines on individual multicore nodes in cloud platforms. Sh...
Mukil Kesavan, Ada Gavrilovska, Karsten Schwan
IICAI
2003
15 years 5 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
VL
1997
IEEE
198views Visual Languages» more  VL 1997»
15 years 8 months ago
Behavior Processors: Layers between End-Users and Java Virtual Machines
Visual programming approaches are limited in their usefulness if they do not include a profile of their users that defines exactly who is attempting to solve what kind of problems...
Alexander Repenning, Andri Ioannidou
CCS
2008
ACM
15 years 6 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...