Sciweavers

381 search results - page 62 / 77
» Scaling question answering to the Web
Sort
View
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
13 years 11 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
WICSA
2007
13 years 8 months ago
Do Architecture Design Methods Meet Architects' Needs?
Several Software Architecture Design Methods (SADM) have been published, reviewed, and compared. But these surveys and comparisons are mostly centered on intrinsic elements of the...
Davide Falessi, Giovanni Cantone, Philippe Kruchte...
COMPUTER
2006
98views more  COMPUTER 2006»
13 years 7 months ago
Componentization: The Visitor Example
: In software design, laziness is a virtue: it's better to reuse than to redo. Design patterns are a good illustration. Patterns, a major advance in software architecture, pro...
Bertrand Meyer, Karine Arnout
PKDD
2010
Springer
172views Data Mining» more  PKDD 2010»
13 years 6 months ago
Surprising Patterns for the Call Duration Distribution of Mobile Phone Users
How long are the phone calls of mobile users? What are the chances of a call to end, given its current duration? Here we answer these questions by studying the call duration distri...
Pedro O. S. Vaz de Melo, Leman Akoglu, Christos Fa...
FC
1998
Springer
96views Cryptology» more  FC 1998»
13 years 11 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss