Sciweavers

2272 search results - page 429 / 455
» Provable Data Privacy
Sort
View
IAT
2005
IEEE
14 years 1 months ago
Sharing Engineering Information and Knowledge
This paper describes an agent-based recommendation system developed to support knowledge acquisition and sharing processes. Its purpose is to aid the process of community building...
Mauro F. Koyama, Olga Nabuco, Francisco Edeneziano...
ITCC
2005
IEEE
14 years 1 months ago
Semantic Grid - Interoperability Solution for Construction VO?
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...
Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel ...
SOUPS
2005
ACM
14 years 1 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ISI
2005
Springer
14 years 1 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...