Sciweavers

754 search results - page 94 / 151
» Can self-managed systems be trusted
Sort
View
ICDAR
2009
IEEE
13 years 8 months ago
Style-Based Ballot Mark Recognition
The push toward voting via hand-marked paper ballots has focused attention on the limitations of current optical scan systems. Discrepancies between human and machine interpretati...
Pingping Xiu, Daniel P. Lopresti, Henry S. Baird, ...
DIM
2005
ACM
14 years 3 days ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
EUROSYS
2010
ACM
14 years 3 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
EUROSYS
2010
ACM
14 years 3 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
PODS
2005
ACM
147views Database» more  PODS 2005»
14 years 10 months ago
Peer data exchange
Abstract. We present a semantics and answer set programs for relational peer data exchange systems. When a peer answers a query, it exchanges data with other peers in order to supp...
Ariel Fuxman, Phokion G. Kolaitis, Renée J....