Sciweavers

746 search results - page 108 / 150
» Real-Life Object-Oriented Systems
Sort
View
112
Voted
CSE
2009
IEEE
15 years 10 months ago
Enabling Privacy as a Fundamental Construct for Social Networks
The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class of Internet applications called social software. These systems focus on leveragi...
E. Michael Maximilien, Tyrone Grandison, Kun Liu, ...
105
Voted
DRM
2009
Springer
15 years 10 months ago
An implementation experience of domain management in marlin
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
Sye Loong Keoh, Koen Vrielink
140
Voted
ISMIS
2009
Springer
15 years 10 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
115
Voted
DSN
2007
IEEE
15 years 9 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
115
Voted
P2P
2006
IEEE
15 years 9 months ago
State Aware Data Dissemination over Structured Overlays
We describe the problem of data dissemination in stream-oriented applications where the required filter is a function of the current state. We call such functions dynamic filter...
Liping Chen, Gul Agha