Sciweavers

1229 search results - page 198 / 246
» Trusted Computing
Sort
View
POST
2012
218views more  POST 2012»
12 years 3 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...
WSDM
2012
ACM
246views Data Mining» more  WSDM 2012»
12 years 3 months ago
Auralist: introducing serendipity into music recommendation
Recommendation systems exist to help users discover content in a large body of items. An ideal recommendation system should mimic the actions of a trusted friend or expert, produc...
Yuan Cao Zhang, Diarmuid Ó Séaghdha,...
HOST
2008
IEEE
14 years 2 months ago
Circuit CAD Tools as a Security Threat
Abstract: Circuit CAD Tools as a Security Threat Jarrod A. Roy†, Farinaz Koushanfar‡ and Igor L. Markov† †The University of Michigan, Department of EECS, 2260 Hayward Ave.,...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
WEBI
2009
Springer
14 years 2 months ago
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities
Information sharing is a key objective in the age of Internet and virtual communities. Reputation information is an important part of a user’s identity and is both a sensitive a...
Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud ...
ESORICS
2009
Springer
14 years 2 months ago
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
Ali Khoshgozaran, Cyrus Shahabi