Sciweavers

1229 search results - page 139 / 246
» Trusted Computing
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme
EMNLP
2004
13 years 11 months ago
Statistical Significance Tests for Machine Translation Evaluation
If two translation systems differ differ in performance on a test set, can we trust that this indicates a difference in true system quality? To answer this question, we describe b...
Philipp Koehn
IANDC
2008
84views more  IANDC 2008»
13 years 8 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
14 years 3 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai
CSCW
2012
ACM
12 years 5 months ago
Community-based web security: complementary roles of the serious and casual contributors
Does crowdsourcing work for web security? While the herculean task of evaluating hundreds of millions of websites can certainly benefit from the wisdom of crowds, skeptics questi...
Pern Hui Chia, John Chuang