Sciweavers

2429 search results - page 158 / 486
» Using Aspects to Design a Secure System
Sort
View
KDD
2009
ACM
172views Data Mining» more  KDD 2009»
14 years 4 months ago
The role of game theory in human computation systems
The paradigm of “human computation” seeks to harness human abilities to solve computational problems or otherwise perform distributed work that is beyond the scope of current ...
Shaili Jain, David C. Parkes
DOLAP
2010
ACM
13 years 7 months ago
Relational versus non-relational database systems for data warehousing
Relational database systems have been the dominating technology to manage and analyze large data warehouses. Moreover, the ER model, the standard in database design, has a close r...
Carlos Ordonez, Il-Yeol Song, Carlos Garcia-Alvara...
FASE
2003
Springer
14 years 2 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
WSC
2004
13 years 10 months ago
Capacity Analysis of Automated Material Handling Systems in Semiconductor Fabs
A critical aspect of semiconductor manufacturing is the design and analysis of material handling and production control polices to optimize fab performance. As wafer sizes have in...
Michael E. Kuhl, Julie Christopher
CCS
2009
ACM
14 years 4 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh