• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,440
Next 10 →

Investor Protection and Corporate Governance

by Rafael La Porta, Florencio Lopez-de-Silanes, Andrei Shleifer, Robert Vishny , 1999
"... Recent research on corporate governance has documented large differences between countries in ownership concentration in publicly traded firms, in the breadth and depth of financial markets, and in the access of firms to external finance. We suggest that there is a common element to the explanations ..."
Abstract - Cited by 590 (11 self) - Add to MetaCart
Recent research on corporate governance has documented large differences between countries in ownership concentration in publicly traded firms, in the breadth and depth of financial markets, and in the access of firms to external finance. We suggest that there is a common element

Protecting Services with Smartcard-Based Access Control: A Case Study at Technical University Berlin

by Thomas Hildmann, Thomas Ge Bhardt , 2001
"... Technical University Berlin is in the process of issuing smartcards to employees and students and providing a wide range of campus-related services over the internet. Therefore an infrastructure supplying security services like user-authentication, secure connections and access control is necessary. ..."
Abstract - Add to MetaCart
. This paper describes the implemented security framework, which uses application level firewalls to implement smartcard-based authentication and a Single-Sign-On (SSO) mechanism. It will be pointed out that such a system will only be maintainable in the future if role-based access control is introduced

How People revisit Web Pages: empirical findings and implications for the design of history systems

by Linda Tauscher, Saul Greenberg - International Journal of Human Computer Studies , 1997
"... We report on users ’ revisitation patterns to World Wide Web (web) pages, and use the results to lay an empirical foundation for the design of history mechanisms in web browsers. Through history, a user can return quickly to a previously visited page, possibly reducing the cognitive and physical ove ..."
Abstract - Cited by 313 (10 self) - Add to MetaCart
to revisit pages just visited, access only a few pages frequently, browse in very small clusters of related pages and generate only short sequences of repeated URL paths. We compared different history mechanisms, and found that the stack-based prediction method prevalent in commercial browsers is inferior

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
and solved with a constraint solver, producing new inputs that exercise different control paths in the program. This process is repeated with the help of a code-coverage maximizing heuristic designed to find defects as fast as possible. We have implemented this algorithm in SAGE (Scalable, Automated, Guided

The LRPD Test: Speculative Run-Time Parallelization of Loops with Privatization and Reduction Parallelization

by Lawrence Rauchwerger, David Padua , 1995
"... Current parallelizing compilers cannot identify a significant fraction of parallelizable loops because they have complex or statically insufficiently defined access patterns. As parallelizable loops arise frequently in practice, we advocate a novel framework for their identification: speculatively e ..."
Abstract - Cited by 261 (44 self) - Add to MetaCart
Current parallelizing compilers cannot identify a significant fraction of parallelizable loops because they have complex or statically insufficiently defined access patterns. As parallelizable loops arise frequently in practice, we advocate a novel framework for their identification: speculatively

Physically based motion transformation

by Zoran Popovic, Andrew Witkin - In Proceedings of ACM SIGGRAPH 99. Computer Graphics Proceedings , 1999
"... We introduce a novel algorithm for transforming character anima-tion sequences that preserves essential physical properties of the motion. By using the spacetime constraints dynamics formulation our algorithm maintains realism of the original motion sequence without sacrificing full user control of ..."
Abstract - Cited by 203 (6 self) - Add to MetaCart
of the editing process. In contrast to most physically based animation techniques that synthesize motion from scratch, we take the approach of motion transformation as the underlying paradigm for generating computer animations. In doing so, we combine the expressive richness of an input animation sequence

Main memory database systems: An overview

by Hector Garcia-molina, Kenneth Salem - IEEE Transactions on Knowledge and Data Engineering , 1992
"... Abstract-Memory resident database systems (MMDB’s) store their data in main physical memory and provide very high-speed access. Conventional database systems are optimized for the particular characteristics of disk storage mechanisms. Memory resident systems, on the other hand, use different optimiz ..."
Abstract - Cited by 221 (2 self) - Add to MetaCart
Abstract-Memory resident database systems (MMDB’s) store their data in main physical memory and provide very high-speed access. Conventional database systems are optimized for the particular characteristics of disk storage mechanisms. Memory resident systems, on the other hand, use different

Mitigating congestion in wireless sensor networks

by Bret Hull, Kyle Jamieson, Hari Balakrishnan - in SenSys , 2004
"... Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality to degrade and loss rates to rise, leads to buffer drops and increased delays (as in wired networks), and tends to be gross ..."
Abstract - Cited by 192 (3 self) - Add to MetaCart
to be grossly unfair toward nodes whose data has to traverse a larger number of radio hops. Congestion control in wired networks is usually done using end-to-end and network-layer mechanisms acting in concert. However, this approach does not solve the problem in wireless networks because concurrent radio

Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs

by Martin Heusse, Franck Rousseau, Romaric Guillier, Andrzej Duda - In ACM SIGCOMM , 2005
"... We consider wireless LANs such as IEEE 802.11 operating in the unlicensed radio spectrum. While their nominal bit rates have increased considerably, the MAC layer remains practically unchanged despite much research effort spent on improving its performance. We observe that most proposals for tuning ..."
Abstract - Cited by 175 (12 self) - Add to MetaCart
the access method focus on a single aspect and disregard others. Our objective is to define an access method optimized for throughput and fairness, able to dynamically adapt to physical channel conditions, to operate near optimum for a wide range of error rates, and to provide equal time shares when hosts

Model Driven Security: from UML Models to Access Control Infrastructures

by David Basin, Jürgen Doser, Torsten Lodderstedt - ACM Transactions on Software Engineering and Methodology , 2006
"... We present a new approach to building secure systems. In our approach, which we call Model Driven Security, designers specify system models along with their security requirements and use tools to automatically generate system architectures from the models including complete, configured access contro ..."
Abstract - Cited by 147 (14 self) - Add to MetaCart
syntactically and semantically) different UML modeling languages with a security modeling language for formalizing access control requirements. From models in the combined languages, we automatically generate access control infrastructures for server-based applications, built from declarative and programmatic
Next 10 →
Results 1 - 10 of 5,440
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University