Sciweavers

754 search results - page 67 / 151
» Can self-managed systems be trusted
Sort
View
MEDIAFORENSICS
2010
13 years 11 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo
ICONS
2008
IEEE
14 years 4 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
SIGDOC
1992
ACM
14 years 2 months ago
Documenting software systems with views
Softwareprofessionals rely on internaldocumentationas an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be tru...
Scott R. Tilley, Hausi A. Müller, Mehmet A. O...
WWW
2006
ACM
14 years 11 months ago
The credibility of the posted information in a recommendation system based on a map
We propose a method for estimating the credibility of the posted information from users. The system displays these information on the map. Since posted information can include sub...
Koji Yamamoto, Daisuke Katagami, Katsumi Nitta, Ak...
SISW
2005
IEEE
14 years 3 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman