Sciweavers

2310 search results - page 230 / 462
» Managing System and Active-Content Integrity
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
14 years 2 months ago
Extending the Applicability of Recommender Systems: A Multilayer Framework for Matching Human Resources
Recommender Systems (RS) so far have been applied to many fields of e-commerce in order to assist users in finding the products that best meet their preferences. However, while th...
Tobias Keim
ECTEL
2007
Springer
14 years 2 months ago
Learning Resource Referencing, Search and Aggregation at the eLearning System Level
TELOS is a new eLearning system being built within the Canadian LORNET project. TELOS aims to provide an open operating system in which users can develop and use eLearning and know...
Gilbert Paquette, François Magnan
KR
2010
Springer
14 years 1 months ago
Finding Explanations of Inconsistency in Multi-Context Systems
We provide two approaches for explaining inconsistency in multi-context systems, where decentralized and heterogeneous system parts interact via nonmonotonic bridge rules. Inconsi...
Thomas Eiter, Michael Fink, Peter Schüller, A...
ATC
2007
Springer
13 years 10 months ago
A Generic and Modular System Architecture for Trustworthy, Autonomous Applications
We propose a generic architecture to facilitate the systematic design of autonomous, adaptive and safe applications. We specify generic modules including a trustworthiness enforcem...
George Brancovici, Christian Müller-Schloer