Sciweavers

162 search results - page 15 / 33
» The Design of a Trustworthy Voting System
Sort
View
CHI
2004
ACM
16 years 3 days ago
Be a judge!: wearable wireless motion sensors for audience participation
In recent years the Olympic Games have undergone vast criticism due to perceived subjective scoring in judged events, as for example figure skating and gymnastics. Judges' sc...
Wolfgang Aigner, Martin Tomitsch, Miruna Stroe, Re...
SC
2004
ACM
15 years 5 months ago
Fastpath Optimizations for Cluster Recovery in Shared-Disk Systems
We describe the design and implementation of a clustering service for a high-performance, shared-disk file system. The service provides failure detection and recovery, reliable e...
Randal C. Burns
TRUSTBUS
2010
Springer
14 years 10 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen
CCS
2008
ACM
15 years 1 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
DESRIST
2009
Springer
132views Education» more  DESRIST 2009»
15 years 4 months ago
Outline of a design science research process
Discussions about the body of knowledge of information systems, including the research domain, relevant perspectives and methods have been going on for a long time. Many researche...
Philipp Offermann, Olga Levina, Marten Schönh...