Sciweavers

4897 search results - page 69 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
ISSA
2004
13 years 10 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 2 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
DEBU
2010
127views more  DEBU 2010»
13 years 6 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
OSDI
2008
ACM
14 years 9 months ago
Device Driver Safety Through a Reference Validation Mechanism
Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them withou...
Dan Williams, Emin Gün Sirer, Fred B. Schneid...
ACL
2006
13 years 10 months ago
Statistical Phrase-Based Models for Interactive Computer-Assisted Translation
Obtaining high-quality machine translations is still a long way off. A postediting phase is required to improve the output of a machine translation system. An alternative is the s...
Jesús Tomás, Francisco Casacuberta