Sciweavers

1167 search results - page 181 / 234
» policy 2007
Sort
View
WWW
2007
ACM
16 years 5 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
CHI
2007
ACM
16 years 4 months ago
Usability of voting systems: baseline data for paper, punch cards, and lever machines
In the United States, computer-based voting machines are rapidly replacing other older technologies. While there is potential for this to be a usability improvement, particularly ...
Michael D. Byrne, Kristen K. Greene, Sarah P. Ever...
HPCA
2007
IEEE
16 years 4 months ago
Exploiting Postdominance for Speculative Parallelization
Task-selection policies are critical to the performance of any architecture that uses speculation to extract parallel tasks from a sequential thread. This paper demonstrates that ...
Mayank Agarwal, Kshitiz Malik, Kevin M. Woley, Sam...
VLDB
2007
ACM
116views Database» more  VLDB 2007»
16 years 4 months ago
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases
Databases are increasingly being used to store information covered by heterogeneous policies, which require support for access control with great flexibility. This has led to incr...
Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa...
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
16 years 4 months ago
Exploiting self-monitoring sample views for cardinality estimation
Good cardinality estimates are critical for generating good execution plans during query optimization. Complex predicates, correlations between columns, and user-defined functions...
Jingren Zhou, Per-Åke Larson, Peter Zabback,...