Sciweavers

19003 search results - page 42 / 3801
» We Need Assurance
Sort
View
98
Voted
IFIPTM
2009
89views Management» more  IFIPTM 2009»
14 years 10 months ago
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing
Abstract. Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect...
Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino
77
Voted
FOSSACS
2001
Springer
15 years 5 months ago
On the Modularity of Deciding Call-by-Need
In a recent paper we introduced a new framework for the study of call by need computations. Using elementary tree automata techniques and ground tree transducers we obtained simple...
Irène Durand, Aart Middeldorp
IPM
2000
69views more  IPM 2000»
15 years 10 days ago
Real life, real users, and real needs: a study and analysis of user queries on the web
We analyzed transaction logs containing 51,473 queries posed by 18,113 users of Excite, a major Internet search service. We provide data on: (i) sessions - changes in queries durin...
Bernard J. Jansen, Amanda Spink, Tefko Saracevic
ECOOPW
1998
Springer
15 years 4 months ago
Software Quality in the Objectory Process
In this paper we discuss how software quality assurance is realized in Rational Objectory. Although much support is given through guidelines and checkpoints, the tool fails to prov...
Klaas van den Berg
103
Voted
ACSW
2006
15 years 1 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt