Sciweavers

2257 search results - page 55 / 452
» Information accountability
Sort
View
IPAW
2010
14 years 9 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
CCS
2010
ACM
15 years 6 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
BMCBI
2008
119views more  BMCBI 2008»
14 years 12 months ago
Snagger: A user-friendly program for incorporating additional information for tagSNP selection
Background: There has been considerable effort focused on developing efficient programs for tagging single-nucleotide polymorphisms (SNPs). Many of these programs do not account f...
Christopher K. Edlund, Won H. Lee, Dalin Li, David...
FLAIRS
2003
15 years 1 months ago
Multi-Document Summaries Based on Semantic Redundancy
This paper presents a technique for producing short summaries from multiple documents. This technique promotes the belief that informative short summaries may be generated when us...
Sanda M. Harabagiu, V. Finley Lacatusu, Steven J. ...
AMS
2007
Springer
288views Robotics» more  AMS 2007»
15 years 6 months ago
Autonomous Exploration for 3D Map Learning
Abstract. Autonomous exploration is a frequently addressed problem in the robotics community. This paper presents an approach to mobile robot exploration that takes into account th...
Dominik Joho, Cyrill Stachniss, Patrick Pfaff, Wol...