Sciweavers

837 search results - page 165 / 168
» Tools for domain-based policy management of distributed syst...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 7 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
KCAP
2005
ACM
14 years 1 months ago
Estimating similarity among collaboration contributions
The need for collaboration arises in many activities required for effective problem solving and decision making. We are developing Angler, a web-services tool that supports collab...
Kenneth S. Murray, John D. Lowrance, Douglas E. Ap...
SIGUCCS
2000
ACM
14 years 2 days ago
Automating Residence Hall Internet Signups
As colleges and universities are moving into the realm of providing Internet connections to the residence dormitories (ResNet), the local help desk is becoming the focal point for...
John R. Miller, Tom Peterson
KDD
2004
ACM
117views Data Mining» more  KDD 2004»
14 years 8 months ago
Predicting customer shopping lists from point-of-sale purchase data
This paper describes a prototype that predicts the shopping lists for customers in a retail store. The shopping list prediction is one aspect of a larger system we have developed ...
Chad M. Cumby, Andrew E. Fano, Rayid Ghani, Marko ...