Sciweavers

1467 search results - page 128 / 294
» Computing with Electronic Nanotechnologies
Sort
View
ISN
1998
Springer
14 years 20 days ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
ISF
2010
273views more  ISF 2010»
13 years 6 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
EDBT
2008
ACM
149views Database» more  EDBT 2008»
14 years 9 months ago
A probabilistic trust model for semantic peer to peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
CCS
2009
ACM
14 years 3 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh
ISBI
2008
IEEE
14 years 3 months ago
An optimal-path approach for neural circuit reconstruction
Neurobiologists are collecting large amounts of electron microscopy image data to gain a better understanding of neuron organization in the central nervous system. Image analysis ...
Elizabeth Jurrus, Ross T. Whitaker, Bryan W. Jones...