While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
Softwareprofessionals rely on internaldocumentationas an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be tru...
We propose a method for estimating the credibility of the posted information from users. The system displays these information on the map. Since posted information can include sub...
Koji Yamamoto, Daisuke Katagami, Katsumi Nitta, Ak...
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...