Sciweavers

262 search results - page 35 / 53
» Providing Trusted Components to the Industry
Sort
View
INTERACT
2003
14 years 10 months ago
Confidence Displays and Training in Recommender Systems
: Recommender systems help users sort through vast quantities of information. Sometimes, however, users do not know if they can trust the recommendations they receive. Adding a con...
Sean M. McNee, Shyong K. Lam, Catherine Guetzlaff,...
103
Voted
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
14 years 1 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
INFOCOM
2012
IEEE
12 years 12 months ago
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
—Location sharing is a fundamental component of mobile online social networks (mOSNs), which also raises significant privacy concerns. The mOSNs collect a large amount of locati...
Wei Wei, Fengyuan Xu, Qun Li
82
Voted
EMSOFT
2007
Springer
15 years 3 months ago
Virtual execution of AADL models via a translation into synchronous programs
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended ...
Erwan Jahier, Nicolas Halbwachs, Pascal Raymond, X...
ESOP
2003
Springer
15 years 2 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen