Sciweavers

12193 search results - page 52 / 2439
» It's not all about
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 4 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
SEE
2010
Springer
13 years 8 months ago
The Social Nature of Engineering and its Implications for Risk Taking
Making decisions with an, often significant, element of risk seems to be an integral part of many of the projects of the diverse profession of engineering. Whether it be decisions...
Allison Ross, Nafsika Athanassoulis
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
12 years 4 days ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
IWC
2008
53views more  IWC 2008»
13 years 9 months ago
Robot ethics? Not yet: A reflection on Whitby's "Sometimes it's hard to be a robot"
Science fiction stories seductively portray robots as human. In present reality (early 21st century) robots are machines, even though they can do many things far better than human...
Harold W. Thimbleby
FLAIRS
2004
13 years 11 months ago
ABSURDIST II: A Graph Matching Algorithm and its Application to Conceptual System Translation
ABSURDIST II, an extension to ABSURDIST, is an algorithm using attributed graph matching to find translations between conceptual systems. It uses information about the internal st...
Ying Feng, Robert L. Goldstone, Vladimir Menkov