Sciweavers

1195 search results - page 162 / 239
» What, Where
Sort
View
GECON
2008
Springer
152views Business» more  GECON 2008»
13 years 8 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
HASKELL
2008
ACM
13 years 8 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
SIGCOMM
2010
ACM
13 years 8 months ago
Multi-hop packet tracking for experimental facilities
The Internet has become a complex system with increasing numbers of end-systems, applications, protocols and types of networks. Although we have a good understanding of how data i...
Tacio Santos, Christian Henke, Carsten Schmoll, Ta...
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
13 years 7 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
CGF
2008
127views more  CGF 2008»
13 years 7 months ago
Viewfinder Alignment
The viewfinder of a digital camera has traditionally been used for one purpose: to display to the user a preview of what is seen through the camera's lens. High quality camer...
Andrew Adams, Natasha Gelfand, Kari Pulli