Sciweavers

165 search results - page 29 / 33
» Reasoning about the Role of Information Systems in Trusting ...
Sort
View
ICS
2003
Tsinghua U.
14 years 24 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CHI
2004
ACM
14 years 8 months ago
Common sense investing: bridging the gap between expert and novice
In this paper, we describe Common Sense Investing (CSI), an interactive investment tool that uses a knowledge base of common sense statements in conjunction with domain knowledge ...
Ashwani Kumar, Sharad C. Sundararajan, Henry Liebe...
ATAL
2010
Springer
13 years 8 months ago
Opportunistic belief reconciliation during distributed interactions
Successful interaction between autonomous agents is contingent on those agents making decisions consistent with the expectations of their peers -- these expectations are based on ...
Paul Martin, David Robertson, Michael Rovatsos
AVI
2008
13 years 10 months ago
Exploring blog archives with interactive visualization
Browsing a blog archive is currently not well supported. Users cannot gain an overview of a blog easily, nor do they receive adequate support for finding potentially interesting e...
Indratmo, Julita Vassileva, Carl Gutwin
CAISE
2007
Springer
14 years 1 months ago
Analyzing the Business of Software: A Modelling Technique for Software Supply Networks
Abstract. One of the most significant paradigm shifts of software business management is that individual organizations no longer compete as single entities but as complex dynamic ...
Slinger Jansen, Anthony Finkelstein, Sjaak Brinkke...