Sciweavers

2648 search results - page 103 / 530
» Human Factors In Computer Security
Sort
View
CIKM
2008
Springer
15 years 5 months ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
OOPSLA
2010
Springer
15 years 1 months ago
Almost free concurrency! (using GOF patterns)
We present a framework that provides concurrency-enhanced versions of the GOF object-oriented design patterns. The main benefit of our work is that if programmers improve program...
Sean L. Mooney, Hridesh Rajan, Steven M. Kautz, Wa...
GIL
2010
15 years 1 months ago
Precision Farming also for Small Scale Farmers
: The current and future food insecurity situation of many nations has been effected by factors like global warming, population growth, bio-energy, low technology acceptance, unfav...
Walter H. Mayer
IEEESCC
2008
IEEE
15 years 9 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu
KDD
2009
ACM
184views Data Mining» more  KDD 2009»
15 years 9 months ago
Thumbs-Up: a game for playing to rank search results
Human computation is an effective way to channel human effort spent playing games to solving computational problems that are easy for humans but difficult for computers to autom...
Ali Dasdan, Chris Drome, Santanu Kolay, Micah Alpe...