Sciweavers

2022 search results - page 305 / 405
» Trust in Multi-Agent Systems
Sort
View
MOBIHOC
2012
ACM
13 years 2 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
144
Voted
SIGIR
2012
ACM
13 years 2 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 6 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
ESORICS
2006
Springer
15 years 4 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
137
Voted
CORR
2011
Springer
140views Education» more  CORR 2011»
14 years 4 months ago
A Wiki for Business Rules in Open Vocabulary, Executable English
The problem of business-IT alignment is of widespread economic concern. As one way of addressing the problem, this paper describes an online system that functions as a kind of Wik...
Adrian Walker