Sciweavers

2310 search results - page 230 / 462
» Managing System and Active-Content Integrity
Sort
View
137
Voted
SACMAT
2003
ACM
15 years 9 months ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen
134
Voted
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 10 months ago
Extending the Applicability of Recommender Systems: A Multilayer Framework for Matching Human Resources
Recommender Systems (RS) so far have been applied to many fields of e-commerce in order to assist users in finding the products that best meet their preferences. However, while th...
Tobias Keim
109
Voted
ECTEL
2007
Springer
15 years 9 months ago
Learning Resource Referencing, Search and Aggregation at the eLearning System Level
TELOS is a new eLearning system being built within the Canadian LORNET project. TELOS aims to provide an open operating system in which users can develop and use eLearning and know...
Gilbert Paquette, François Magnan
127
Voted
KR
2010
Springer
15 years 8 months ago
Finding Explanations of Inconsistency in Multi-Context Systems
We provide two approaches for explaining inconsistency in multi-context systems, where decentralized and heterogeneous system parts interact via nonmonotonic bridge rules. Inconsi...
Thomas Eiter, Michael Fink, Peter Schüller, A...
119
Voted
ATC
2007
Springer
15 years 5 months ago
A Generic and Modular System Architecture for Trustworthy, Autonomous Applications
We propose a generic architecture to facilitate the systematic design of autonomous, adaptive and safe applications. We specify generic modules including a trustworthiness enforcem...
George Brancovici, Christian Müller-Schloer