Sciweavers

3021 search results - page 494 / 605
» Trust in recommender systems
Sort
View
AISC
1998
Springer
14 years 2 months ago
Reasoning About Coding Theory: The Benefits We Get from Computer Algebra
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
Clemens Ballarin, Lawrence C. Paulson
ICSE
2000
IEEE-ACM
14 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
CODASPY
2012
12 years 5 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
HICSS
2003
IEEE
84views Biometrics» more  HICSS 2003»
14 years 3 months ago
Constructing Electronic Marketplaces using Peer-to-Peer Technology
Due to the widespread appearance of filesharing systems like Napster, the peer-to-peer concept has recently become well known. So far, these file-sharing systems have been used fo...
Nick Gehrke, Matthias Schumann
ICIP
2008
IEEE
14 years 11 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...