Sciweavers

44 search results - page 6 / 9
» The Examination of an Information-Based Approach to Trust
Sort
View
WWW
2011
ACM
13 years 1 months ago
Wikipedia vandalism detection
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
Santiago Moisés Mola-Velasco
CSSW
2007
13 years 8 months ago
Semantic Integrator: Semi-Automatically Enhancing Social Semantic Web Environments
Abstract: Large amounts of information from various sources have often to be considered when collaboratively developing semantic structures. Examining all relevant information can ...
Steffen Lohmann, Philipp Heim, Jürgen Ziegler
WISEC
2010
ACM
13 years 6 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 7 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
SP
1998
IEEE
13 years 11 months ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine