Sciweavers

1155 search results - page 170 / 231
» Trusting Data Quality in Cooperative Information Systems
Sort
View
ICS
2003
Tsinghua U.
15 years 6 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
98
Voted
TDP
2008
111views more  TDP 2008»
15 years 1 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
123
Voted
WCRE
2010
IEEE
14 years 12 months ago
Evaluating the Impact of Software Evolution on Software Clustering
—The evolution of a software project is a rich data source for analyzing and improving the software development process. Recently, several research groups have tried to cluster s...
Fabian Beck, Stephan Diehl
P2P
2006
IEEE
153views Communications» more  P2P 2006»
15 years 7 months ago
A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids
Peer-to-peer grids aim to build computational grids encompassing thousands of sites. To achieve this scale, such systems cannot rely on trust or off-line negotiations among partic...
Miranda Mowbray, Francisco Vilar Brasileiro, Nazar...
HICSS
2006
IEEE
73views Biometrics» more  HICSS 2006»
15 years 7 months ago
Determining Success for Different Website Goals
In building a successful website it is imperative that the design matches the organization’s objectives, which should be well defined. Clearly, different types of websites will ...
L. Christian Schaupp, Weiguo Fan, France Belanger