Sciweavers

1438 search results - page 271 / 288
» Models for Trustworthy Service and Process Oriented Systems
Sort
View
ISSA
2004
15 years 1 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 6 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
WWW
2008
ACM
16 years 12 days ago
Using the wisdom of the crowds for keyword generation
In the sponsored search model, search engines are paid by businesses that are interested in displaying ads for their site alongside the search results. Businesses bid for keywords...
Ariel Fuxman, Panayiotis Tsaparas, Kannan Achan, R...
KDD
2001
ACM
228views Data Mining» more  KDD 2001»
16 years 3 days ago
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive indust
REVI-MINER is a KDD-environment which supports the detection and analysis of deviations in warranty and goodwill cost statements. The system was developed within the framework of ...
Edgar Hotz, Udo Grimmer, W. Heuser, Gholamreza Nak...
DATE
2004
IEEE
97views Hardware» more  DATE 2004»
15 years 3 months ago
A Formal Verification Methodology for Checking Data Integrity
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verificati...
Yasushi Umezawa, Takeshi Shimizu