Sciweavers

3256 search results - page 549 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
CSE
2009
IEEE
15 years 4 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
CIKM
2007
Springer
15 years 4 months ago
Autonomously semantifying wikipedia
Berners-Lee’s compelling vision of a Semantic Web is hindered by a chicken-and-egg problem, which can be best solved by a bootstrapping method — creating enough structured dat...
Fei Wu, Daniel S. Weld
SOQUA
2004
14 years 11 months ago
Measuring Component Performance Using A Systematic Approach and Environment
: As more third-party software components are available in the commercial market, more people begin to use the component-based software engineering approach to developing component...
Jerry Gao, Chandra S. Ravi, Raquel Espinoza
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 2 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
EUROSYS
2008
ACM
15 years 7 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...