Sciweavers

349 search results - page 54 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
WWW
2009
ACM
14 years 9 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
BMCBI
2008
77views more  BMCBI 2008»
13 years 8 months ago
Stochastic models for the in silico simulation of synaptic processes
Background: Research in life sciences is benefiting from a large availability of formal description techniques and analysis methodologies. These allow both the phenomena investiga...
Andrea Bracciali, Marcello Brunelli, Enrico Catald...
LCPC
2004
Springer
14 years 1 months ago
HiLO: High Level Optimization of FFTs
As computing platforms become more and more complex, the task of optimizing performance critical codes becomes more challenging. Recently, more attention has been focused on automa...
Nick Rizzolo, David A. Padua
NSPW
2003
ACM
14 years 1 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
CSCL
2007
114views more  CSCL 2007»
13 years 8 months ago
Community-based learning: The core competency of residential, research-based universities
Traditionally, universities focus primarily on instructionist teaching. Such an understanding has been criticized from theoretical and practical points of view. We believe that so...
Gerhard Fischer, Markus Rohde, Volker Wulf