Sciweavers

1527 search results - page 279 / 306
» What About Wednesday
Sort
View
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
14 years 1 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn
PLDI
2005
ACM
14 years 1 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
ATAL
2005
Springer
14 years 1 months ago
Modeling opponent decision in repeated one-shot negotiations
In many negotiation and bargaining scenarios, a particular agent may need to interact repeatedly with another agent. Typically, these interactions take place under incomplete info...
Sabyasachi Saha, Anish Biswas, Sandip Sen
CAISE
2005
Springer
14 years 1 months ago
A Meta Model for Process Mining Data
Abstract. Modern process-aware information systems store detailed information about processes as they are being executed. This kind of information can be used for very different p...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
MHCI
2005
Springer
14 years 1 months ago
Understanding the role of image recognition in mobile tour guides
Users of mobile tour guides often express a strong desire for the system to be able to provide information on arbitrary objects they encounter during their visit – akin to point...
Nigel Davies, Keith Cheverst, Alan J. Dix, Andre H...