Sciweavers

222 search results - page 15 / 45
» di 2010
Sort
View
ICWSM
2010
13 years 9 months ago
Mobilizing Lurkers with a Targeted Task
Users of online communities are commonly classified into active members versus lurkers. In this work we experiment with a method designed to encourage lurkers to share their acqui...
Rosta Farzan, Joan Morris DiMicco, Beth Brownholtz
DBSEC
2010
123views Database» more  DBSEC 2010»
13 years 8 months ago
Evaluating the Risk of Adopting RBAC Roles
We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
MOBILIGHT
2010
13 years 6 months ago
Robust Wireless Network Coding - An Overview
Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswe...
Marco Di Renzo, Lana Iwaza, Michel Kieffer, Pierre...
EUROSYS
2010
ACM
14 years 5 months ago
Differential RAID: Rethinking RAID for SSD Reliability
Deployment of SSDs in enterprise settings is limited by the low erase cycles available on commodity devices. Redundancy solutions such as RAID can potentially be used to protect a...
Mahesh Balakrishnan, Asim Kadav, Vijayan Prabhakar...
NPC
2010
Springer
13 years 6 months ago
Differentiated Replication Strategy in Data Centers
Cloud computing has attracted a great deal of attention in both academia and industry. We envision the provision of differentiated services as being one of the key components to th...
Tung Nguyen, Anthony Cutway, Weisong Shi