Sciweavers

1715 search results - page 255 / 343
» Trust and Reputation Systems
Sort
View
SIGMOD
2007
ACM
108views Database» more  SIGMOD 2007»
16 years 5 months ago
Provenance in databases
The provenance of data has recently been recognized as central to the trust one places in data. It is also important to annotation, to data integration and to probabilistic databa...
Peter Buneman, Wang Chiew Tan
PODS
2005
ACM
147views Database» more  PODS 2005»
16 years 5 months ago
Peer data exchange
Abstract. We present a semantics and answer set programs for relational peer data exchange systems. When a peer answers a query, it exchanges data with other peers in order to supp...
Ariel Fuxman, Phokion G. Kolaitis, Renée J....
PERCOM
2007
ACM
16 years 4 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
EUROSEC
2009
ACM
16 years 3 days ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
171
Voted
NCA
2009
IEEE
16 years 1 days ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman