Sciweavers

791 search results - page 68 / 159
» Users and Trust in Cyberspace
Sort
View
GCC
2004
Springer
14 years 1 months ago
A New Grid Security Framework with Dynamic Access Control
Abstract. In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating resul...
Bing Xie, Xiaolin Gui, Yinan Li, Depei Qian
CIDR
2011
188views Algorithms» more  CIDR 2011»
12 years 11 months ago
Managing Structured Collections of Community Data
Data management is becoming increasingly social. We observe a new form of information in such collaborative scenarios, where users contribute and reuse information, which resides ...
Wolfgang Gatterbauer, Dan Suciu
WSDM
2012
ACM
246views Data Mining» more  WSDM 2012»
12 years 3 months ago
Auralist: introducing serendipity into music recommendation
Recommendation systems exist to help users discover content in a large body of items. An ideal recommendation system should mimic the actions of a trusted friend or expert, produc...
Yuan Cao Zhang, Diarmuid Ó Séaghdha,...
WIOPT
2010
IEEE
13 years 6 months ago
A contracts-based approach for spectrum sharing among cognitive radios
Abstract—Development of dynamic spectrum access and allocation techniques recently have made feasible the vision of cognitive radio systems. However, a fundamental question arise...
Dileep M. Kalathil, Rahul Jain
ACSAC
2004
IEEE
13 years 11 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...