Sciweavers

551 search results - page 32 / 111
» Preventing existence
Sort
View
JDCTA
2010
250views more  JDCTA 2010»
14 years 6 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
CBMS
2007
IEEE
15 years 6 months ago
Merging Healthcare Ontologies: Inconsistency Tolerance and Implementation Issues
A major challenge for ontology integration is to deal with inconsistencies. Existing merging tools are based on classical logic and are forced to avoid inconsistencies (to prevent...
Fahim T. Imam, Wendy MacCaull, Margaret Ann Kenned...
ICDCSW
2007
IEEE
15 years 6 months ago
Building Trust in Online Rating Systems Through Signal Modeling
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but difficult problem. Thi...
Yafei Yang, Yan Lindsay Sun, Jin Ren, Qing Yang
CCS
2004
ACM
15 years 5 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
87
Voted
SOSP
2003
ACM
15 years 8 months ago
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
Michael M. Swift, Brian N. Bershad, Henry M. Levy