Sciweavers

759 search results - page 139 / 152
» What Can Be Implemented Anonymously
Sort
View
CCS
2010
ACM
13 years 10 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
JTAER
2006
100views more  JTAER 2006»
13 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
CGA
2004
13 years 9 months ago
Hyperscore: A Graphical Sketchpad for Novice Composers
graphical abstractions, Hyperscore provides a visual analogue for what is happening structurally in the music as opposed to displaying musical events in procedural notation or as a...
Morwaread M. Farbood, Egon C. Pasztor, Kevin Jenni...
HEURISTICS
2000
127views more  HEURISTICS 2000»
13 years 9 months ago
Fast, Efficient Equipment Placement Heuristics for Broadband Switched or Internet Router Networks
Planning and designing the next generation of IP router or switched broadband networks seems a daunting challenge considering the many complex, interacting factors affecting the p...
Joel W. Gannett
OTM
2010
Springer
13 years 8 months ago
CoMaP: A Cooperative Overlay-Based Mashup Platform
Recently, mashups have emerged as an important class of Web 2.0 collaborative applications. Mashups can be conceived as personalized Web services which aggregate and manipulate dat...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...