Sciweavers

1216 search results - page 149 / 244
» Online Prediction with Privacy
Sort
View
NORDSEC
2009
Springer
14 years 4 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
SAFECOMP
2009
Springer
14 years 4 months ago
Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control
The behaviour of control functions in safety critical software systems is typically bounded to prevent the occurrence of known system level hazards. These bounds are typically deri...
Zeshan Kurd, Tim Kelly, John A. McDermid, Radu Cal...
IEEEARES
2008
IEEE
14 years 4 months ago
Rapid Detection of Constant-Packet-Rate Flows
—The demand for effective VoIP and online gaming traffic management methods continues to increase for purposes such as QoS provisioning, usage accounting, and blocking VoIP call...
Kuan-Ta Chen, Jing-Kai Lou
IEEEARES
2007
IEEE
14 years 4 months ago
Dirichlet Reputation Systems
— Reputation systems can be used in online markets and communities in order to stimulate quality and good behaviour as well as to sanction poor quality and bad behaviour. The bas...
Audun Jøsang, Jochen Haller
ISI
2007
Springer
14 years 4 months ago
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of c...
Phillip G. Bradford, Daniel A. Ray