Sciweavers

1229 search results - page 125 / 246
» Trusted Computing
Sort
View
PDP
2008
IEEE
14 years 4 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
SAC
2005
ACM
14 years 3 months ago
Scalable security and accounting services for content-based publish/subscribe systems
Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large scale dynamic applications. However, widespread use of these systems...
Himanshu Khurana
ACL
2009
13 years 8 months ago
The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language
In this paper, we present initial experiments in the recognition of deceptive language. We introduce three data sets of true and lying texts collected for this purpose, and we sho...
Rada Mihalcea, Carlo Strapparava
ASM
2003
ASM
14 years 3 months ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer
CHI
2003
ACM
14 years 3 months ago
Prominence-interpretation theory: explaining how people assess credibility online
Four years of research has led to a theory that describes how people assess the credibility of Web sites. This theory proposes that users notice and interpret various Web site ele...
B. J. Fogg