Sciweavers

448 search results - page 24 / 90
» Who is in Control
Sort
View
CSE
2009
IEEE
15 years 10 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu
EPEW
2008
Springer
15 years 5 months ago
An Empirical Investigation of the Applicability of a Component-Based Performance Prediction Method
Abstract. Component-based software performance engineering (CBSPE) methods shall enable software architects to assess the expected response times, throughputs, and resource utiliza...
Anne Martens, Steffen Becker, Heiko Koziolek, Ralf...
WPES
2005
ACM
15 years 9 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 10 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
INFOCOM
2007
IEEE
15 years 10 months ago
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer