Sciweavers

754 search results - page 69 / 151
» Can self-managed systems be trusted
Sort
View
IPTPS
2004
Springer
14 years 3 months ago
2 P2P or Not 2 P2P?
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge how suitable a P2P solution might be for a particular problem. It is bas...
Mema Roussopoulos, Mary Baker, David S. H. Rosenth...
SWWS
2008
13 years 11 months ago
A proposal for Ontology Security Standards
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semant...
Muhammad Reza Fatemi, Atilla Elçi, Zeki Bay...
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
COLING
2010
13 years 5 months ago
A Minimum Error Weighting Combination Strategy for Chinese Semantic Role Labeling
Many Semantic Role Labeling (SRL) combination strategies have been proposed and tested on English SRL task. But little is known about how much Chinese SRL can benefit from system ...
Tao Zhuang, Chengqing Zong
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
13 years 1 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig