Sciweavers

181 search results - page 13 / 37
» Knowledge Provenance
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 8 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
IADIS
2004
13 years 9 months ago
Web Document Classification: Managing Context Change
This paper focuses on the information management systems of the dynamic World Wide Web. Many individual web pages, such as news portals, provide periodic information and public an...
Sung Sik Park, Yang Sok Kim, Byeong Ho Kang
MAGS
2010
106views more  MAGS 2010»
13 years 3 months ago
On the convergence of autonomous agent communities
Community is a common phenomenon in natural ecosystems, human societies as well as artificial multi-agent systems such as those in web and Internet based applications. In many sel...
Hong Zhu, Fang Wang, Shufeng Wang
TEI
2009
ACM
115views Hardware» more  TEI 2009»
14 years 3 months ago
Fritzing: a tool for advancing electronic prototyping for designers
Today a growing community of DIY-practitioners, artists and designers are using microcontroller-based toolkits to express their concepts for digital artifacts by building them. Ho...
André Knörig, Reto Wettach, Jonathan C...
CCS
2006
ACM
14 years 4 days ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven