Sciweavers

807 search results - page 124 / 162
» Term Rewriting for Access Control
Sort
View
ICAIL
2007
ACM
15 years 7 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
AOSD
2007
ACM
15 years 7 months ago
Performance improvement for persistent systems by AOP
Efficient data retrieval from databases is a significant issue of the design of persistent systems. We propose an aspect oriented persistent system named AspectualStore. Aspectual...
Yasuhiro Aoki, Shigeru Chiba
DEXA
2006
Springer
121views Database» more  DEXA 2006»
15 years 7 months ago
DCF: An Efficient Data Stream Clustering Framework for Streaming Applications
Streaming applications, such as environment monitoring and vehicle location tracking require handling high volumes of continuously arriving data and sudden fluctuations in these vo...
Kyungmin Cho, SungJae Jo, Hyukjae Jang, Su Myeon K...
130
Voted
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 7 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
AVI
2008
15 years 5 months ago
TapTap and MagStick: improving one-handed target acquisition on small touch-screens
We present the design and evaluation of TapTap and MagStick, two thumb interaction techniques for target acquisition on mobile devices with small touch-screens. These two techniqu...
Anne Roudaut, Stéphane Huot, Eric Lecolinet