Sciweavers

1229 search results - page 167 / 246
» Trusted Computing
Sort
View
PLDI
2004
ACM
14 years 2 months ago
Kill-safe synchronization abstractions
e Synchronization Abstractions “Well, it just so happens that your friend here is only mostly dead. There’s a big difference between mostly dead and all dead.” – Miracle Ma...
Matthew Flatt, Robert Bruce Findler
IWAN
2004
Springer
14 years 2 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
ISSA
2004
13 years 10 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
IHI
2010
124views Healthcare» more  IHI 2010»
13 years 3 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
CHI
2005
ACM
14 years 9 months ago
Acceptance and usability of a relational agent interface by urban older adults
This study examines the acceptance and usability of an animated conversational agent designed to establish longterm relationships with older, mostly minority adult users living in...
Timothy W. Bickmore, Lisa Caruso, Kerri Clough-Gor...