Sciweavers

1155 search results - page 37 / 231
» Trusting Data Quality in Cooperative Information Systems
Sort
View
DAC
2007
ACM
16 years 2 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
CISS
2008
IEEE
15 years 3 months ago
Client-centric fractional frequency reuse based on user cooperation in OFDMA networks
Abstract--This paper proposes client-centric fractional frequency reuse (CC-FFR) techniques for interference mitigation in OFDMA-based cellular wireless networks. In this framework...
Stefan Geirhofer, Ozgur Oyman
WAIM
2007
Springer
15 years 7 months ago
CoXML: A Cooperative XML Query Answering System
Abstract. The heterogeneity nature of XML data creates the need for approximate query answering. In this paper, we present an XML system that cooperates with users to provide user-...
Shaorong Liu, Wesley W. Chu
EUC
2007
Springer
15 years 7 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
WWW
2003
ACM
16 years 2 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...