Sciweavers

8243 search results - page 128 / 1649
» Can We Manage Trust
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
CIDR
2011
188views Algorithms» more  CIDR 2011»
13 years 1 months ago
Managing Structured Collections of Community Data
Data management is becoming increasingly social. We observe a new form of information in such collaborative scenarios, where users contribute and reuse information, which resides ...
Wolfgang Gatterbauer, Dan Suciu
MIDDLEWARE
2010
Springer
13 years 8 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
14 years 4 months ago
The Role of Virtual Distance in Innovation and Success
Although prior research has tended to dichotomize work teams as virtual or nonvirtual, most project teams today involve some mix of face-to-face and virtual interaction. We develo...
Karen Sobel Lojeski, Richard Reilly, Peter Dominic...
CIKM
2008
Springer
14 years 4 days ago
ALPACA: a lightweight platform for analyzing claim acceptability
Internet users face challenges in evaluating the validity of online information. Such evaluation is not adequately supported by current tools; we outline some of the shortcomings ...
Jeff King, Jennifer Stoll, Michael T. Hunter, Must...