Search results
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Coordinating decentralized learning and conflict resolution across agent boundaries
-
Author
-
Cheng, Shanjun
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science, Information technology, Artificial intelligence
-
Description
-
It is crucial for embedded systems to adapt to the dynamics of openenvironments. This adaptation process becomes especially challenging in the context of multiagent systems because of scalability, partial information accessibility and complex inte...
-
-
Title
-
Essays on Exploitation and Exploration in Software Development
-
Author
-
Temizkan, Orcun
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology, Business, Information science
-
Description
-
Software development includes two types of activities: software improvement activities by correcting faults and software enhancement activities by adding new features. Based on organizational theory, we propose that these activities can be classif...
-
-
Title
-
Interactive Programming Support for Secure Software Development
-
Author
-
Xie, Jing
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant fr...
-
-
Title
-
The Visual Uncertainty Paradigm For Controlling Screen-Space Information In Visualization
-
Author
-
Dasgupta, Aritra
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
The information visualization pipeline serves as a lossy communication channel for presentation of data on a screen-space of limited resolution. The lossy communication is not just a machine-only phenomenon due to information loss caused by transl...
-
-
Title
-
UNDERSTANDING AND DESIGNING FOR INTERACTIONAL PRIVACY NEEDS WITHIN SOCIAL NETWORKING SITES
-
Author
-
Wisniewski, Pamela
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science, Information technology, Social sciences--Research
-
Description
-
"Interpersonal boundary regulation" is a way to optimize social interactions when sharing and connecting through Social Networking Sites (SNSs). The theoretical foundation of much of my research comes from Altman's work on privacy management in th...
-
-
Title
-
USER PARTICIPATION INTENTION AND SOCIAL INFLUENCE IN VIRTUAL COMMUNITIES
-
Author
-
Zheng, YiMing
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology, Social sciences
-
Description
-
A virtual community ("VC") is a group of people who interact primarily via IT, rather than face-to-face, for informational, social, professional, educational or other purposes. Given the growing popularity and special features of VCs (user-generat...