Sciweavers

1575 search results - page 37 / 315
» The provenance of electronic data
Sort
View
SIGMOD
2008
ACM
167views Database» more  SIGMOD 2008»
15 years 9 months ago
Efficient lineage tracking for scientific workflows
Data lineage and data provenance are key to the management of scientific data. Not knowing the exact provenance and processing pipeline used to produce a derived data set often re...
Thomas Heinis, Gustavo Alonso
WETICE
1997
IEEE
15 years 1 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
DMSN
2010
ACM
14 years 10 months ago
Provenance-based trustworthiness assessment in sensor networks
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino
DFT
2007
IEEE
109views VLSI» more  DFT 2007»
15 years 4 months ago
Safety Evaluation of NanoFabrics
Chemically Assembled Electronic Nanotechnology is a promising alternative to CMOS fabrication. In particular, the nanoFabric has proven to be a viable solution for implementing di...
Michelangelo Grosso, Maurizio Rebaudengo, Matteo S...
CSE
2009
IEEE
15 years 4 months ago
Designing Privacy for Scalable Electronic Healthcare Linkage
—A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this. Howeve...
Anthony Stell, Richard O. Sinnott, Oluwafemi Ajayi...