Sciweavers

989 search results - page 183 / 198
» An information-based model for trust
Sort
View
CORR
2010
Springer
106views Education» more  CORR 2010»
14 years 8 months ago
Simulating space and time
This paper explores the idea that the space-time of a virtual reality could appear to those within it as our space-time does to us. The likely processing needed to do this include...
Brian Whitworth
ICASSP
2011
IEEE
14 years 2 months ago
Generating compound words with high order n-gram information in large vocabulary speech recognition systems
In this work we concentrate on generating compound words with high order n-gram information for speech recognition. In most existing compound words generation methods, only bi-gra...
Jie Zhou, Qin Shi, Yong Qin
POPL
2008
ACM
15 years 11 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
15 years 11 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
SOSP
2005
ACM
15 years 7 months ago
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantin...
Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement,...