Sciweavers

3092 search results - page 14 / 619
» Where are you pointing
Sort
View
SYNTHESE
2010
70views more  SYNTHESE 2010»
13 years 5 months ago
What ought probably means, and why you can't detach it
: Some intuitive normative principles raise vexing „detaching problems‟ by their failure to license modus ponens. I examine three such principles (a self-reliance principle and...
Stephen Finlay
DASFAA
2009
IEEE
147views Database» more  DASFAA 2009»
14 years 2 months ago
"Pay-as-You-Go" Processing for Tracing Queries in a P2P Record Exchange System
In recent years, data provenance or lineage tracing which refers to the process of tracing the sources of data, data movement between databases, and annotations written for data ha...
Fengrong Li, Takuya Iida, Yoshiharu Ishikawa
PLDI
2009
ACM
14 years 2 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
CCS
2009
ACM
14 years 2 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
CSE
2009
IEEE
14 years 2 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...