Sciweavers

989 search results - page 185 / 198
» An information-based model for trust
Sort
View
COOTS
1997
14 years 12 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
TMC
2008
159views more  TMC 2008»
14 years 9 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JASIS
2011
124views more  JASIS 2011»
14 years 5 months ago
Ranking of Wikipedia articles in search engines revisited: Fair ranking for reasonable quality?
This paper aims to review the fiercely discussed question of whether the ranking of Wikipedia articles in search engines is justified by the quality of the articles. After an over...
Dirk Lewandowski, Ulrike Spree
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 1 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
MICCAI
2007
Springer
15 years 11 months ago
De-enhancing the Dynamic Contrast-Enhanced Breast MRI for Robust Registration
Abstract. Dynamic enhancement causes serious problems for registration of contrast enhanced breast MRI, due to variable uptakes of agent on different tissues or even same tissues i...
Yuanjie Zheng, Jingyi Yu, Chandra Kambhamettu, Sar...