Sciweavers

19003 search results - page 42 / 3801
» We Need Assurance!
Sort
View
IFIPTM
2009
89views Management» more  IFIPTM 2009»
13 years 5 months ago
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing
Abstract. Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect...
Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino
FOSSACS
2001
Springer
14 years 8 days ago
On the Modularity of Deciding Call-by-Need
In a recent paper we introduced a new framework for the study of call by need computations. Using elementary tree automata techniques and ground tree transducers we obtained simple...
Irène Durand, Aart Middeldorp
IPM
2000
69views more  IPM 2000»
13 years 7 months ago
Real life, real users, and real needs: a study and analysis of user queries on the web
We analyzed transaction logs containing 51,473 queries posed by 18,113 users of Excite, a major Internet search service. We provide data on: (i) sessions - changes in queries durin...
Bernard J. Jansen, Amanda Spink, Tefko Saracevic
ECOOPW
1998
Springer
14 years 5 hour ago
Software Quality in the Objectory Process
In this paper we discuss how software quality assurance is realized in Rational Objectory. Although much support is given through guidelines and checkpoints, the tool fails to prov...
Klaas van den Berg
ACSW
2006
13 years 9 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt