Sciweavers

334 search results - page 48 / 67
» trust 2010
Sort
View
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 2 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 7 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad
CSCW
2010
ACM
14 years 6 months ago
Social use of computer-mediated communication by adults on the autism spectrum
The defining characteristics of autism, including difficulty with nonverbal cues and need for structure, and the defining characteristics of computer-mediated communication (CMC),...
Moira Burke, Robert Kraut, Diane Williams
CSCW
2010
ACM
14 years 6 months ago
Perceptions of trustworthiness online: the role of visual and textual information
People increasingly rely on social networking websites to initiate personal and professional relationships. This requires that a considerable amount of trust be placed in stranger...
Catalina L. Toma
WWW
2010
ACM
14 years 4 months ago
Highlighting disputed claims on the web
We describe Dispute Finder, a browser extension that alerts a user when information they read online is disputed by a source that they might trust. Dispute Finder examines the tex...
Rob Ennals, Beth Trushkowsky, John Mark Agosta