Sciweavers

2022 search results - page 404 / 405
» Trust in Multi-Agent Systems
Sort
View
OOPSLA
2010
Springer
13 years 4 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
TIFS
2010
186views more  TIFS 2010»
13 years 4 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
ACSAC
2010
IEEE
13 years 4 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou
JASIS
2011
124views more  JASIS 2011»
13 years 29 days ago
Ranking of Wikipedia articles in search engines revisited: Fair ranking for reasonable quality?
This paper aims to review the fiercely discussed question of whether the ranking of Wikipedia articles in search engines is justified by the quality of the articles. After an over...
Dirk Lewandowski, Ulrike Spree
PLDI
2011
ACM
12 years 8 months ago
Caisson: a hardware description language for secure information flow
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s roo...
Xun Li 0001, Mohit Tiwari, Jason Oberg, Vineeth Ka...