Sciweavers

344 search results - page 44 / 69
» trust 2009
Sort
View
IAT
2009
IEEE
13 years 6 months ago
Adapting Recommendations Organization to User Preferences
-- Given the overwhelming information appearing in the current web environment, recommendations have been increasingly applied to assist users in handling with the information over...
Li Chen
ICDAR
2009
IEEE
13 years 6 months ago
Style-Based Ballot Mark Recognition
The push toward voting via hand-marked paper ballots has focused attention on the limitations of current optical scan systems. Discrepancies between human and machine interpretati...
Pingping Xiu, Daniel P. Lopresti, Henry S. Baird, ...
IFIP
2009
Springer
13 years 6 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
PET
2009
Springer
14 years 3 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
ICUMT
2009
13 years 6 months ago
Multipath at the transport layer: An end-to-end resilience mechanism
Abstract--As society's dependence on network technology increases, the need for resilience and survivability in these services becomes increasingly apparent. Since the user ex...
Justin P. Rohrer, Ramya Naidu, James P. G. Sterben...