Sciweavers

5901 search results - page 1048 / 1181
» Virtual Learning Environments
Sort
View
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
15 years 7 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
SACMAT
2003
ACM
15 years 7 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
98
Voted
AIIA
2003
Springer
15 years 7 months ago
A Complete Subsumption Algorithm
Abstract. Efficiency of the first-order logic proof procedure is a major issue when deduction systems are to be used in real environments, both on their own and as a component of ...
Stefano Ferilli, Nicola Di Mauro, Teresa Maria Alt...
131
Voted
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
15 years 7 months ago
Challenges to Collaborative Tool Adoption in a Manufacturing Engineering Setting: A Case Study
This study examined a collaborative tool intervention within a geographically-distributed, engineering-design team in a large manufacturing company. Baseline data collection to de...
Elizabeth E. Wierba, Thomas A. Finholt, Michelle P...
WCRE
2002
IEEE
15 years 7 months ago
Knowledge-Based Library Re-Factoring for an Open Source Project
Software miniaturization is a form of software refactoring focused on reducing an application to the bare bone. Porting an application on a hand-held device is very likely to requ...
Massimiliano Di Penta, Markus Neteler, Giuliano An...
« Prev « First page 1048 / 1181 Last » Next »