Sciweavers

1155 search results - page 42 / 231
» Trusting Data Quality in Cooperative Information Systems
Sort
View
CCS
2007
ACM
15 years 7 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
GLOBECOM
2009
IEEE
15 years 5 months ago
Multi-User Cooperative Communications with Relay-Coding for Uplink IMT-Advanced 4G Systems
Adoption of relay stations has been commonly accepted as a key technique for future IMTadvanced 4G systems to improve the link performance. While study in relay systems is often c...
Lei Cao, Jinyun Zhang, Norio Kanno
TOIS
2002
87views more  TOIS 2002»
15 years 1 months ago
Peer-to-peer data trading to preserve information
Data archiving systems rely on replication to preserve information. This paper discusses how a network of autonomousarchiving sites can trade data to achievethe most reliable repl...
Brian F. Cooper, Hector Garcia-Molina
DAC
2010
ACM
15 years 5 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
15 years 11 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...