Sciweavers

318 search results - page 50 / 64
» Enforcing Trust in Pervasive Computing with Trusted Computin...
Sort
View
DEBU
2010
127views more  DEBU 2010»
13 years 6 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
PLDI
2012
ACM
11 years 11 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
PERVASIVE
2010
Springer
13 years 10 months ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
WWW
2008
ACM
14 years 9 months ago
Guanxi in the chinese web - a study of mutual linking
Guanxi is a type of dyadic social interaction based on feelings ("qing") and trust ("xin"). Long studied by scholars of Chinese origin, it has recently drawn t...
Valerie King, Louis Lei Yu, Yan Zhuang
WWW
2007
ACM
14 years 9 months ago
Ontology engineering using volunteer labor
We describe an approach designed to reduce the costs of ontology development through the use of untrained, volunteer knowledge engineers. Results are provided from an experiment i...
Benjamin M. Good, Mark D. Wilkinson