Sciweavers

791 search results - page 158 / 159
» Users and Trust in Cyberspace
Sort
View
ENTCS
2008
101views more  ENTCS 2008»
13 years 5 months ago
Hedaquin: A Reputation-based Health Data Quality Indicator
A number of applications based on personal health records (PHRs) are emerging in the field of health care and wellness. PHRs empower patients by giving them control over their hea...
Ton van Deursen, Paul Koster, Milan Petkovic
CN
2007
137views more  CN 2007»
13 years 5 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
ACSAC
2010
IEEE
13 years 3 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 3 months ago
Using Semantic Wikis for Structured Argument in Medical Domain
This research applies ideas from argumentation theory in the context of semantic wikis, aiming to provide support for structured-large scale argumentation between human agents. The...
Adrian Groza, Radu Balaj
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 23 days ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...