A Trusted Federated System to Share Granular Data Among Disparate Database Resources [0.03%]
一种可信的联邦体系结构以细粒度级别在异构数据库资源之间共享数据
Joanna F DeFranco,David F Ferraiolo,D Richard Kuhn et al.
Joanna F DeFranco et al.
Sharing data between different organizations is a challenge primarily due to database management systems (DBMSs) being different types that impose different schemas to represent and retrieve data. In addition, maintaining security and priva...
Dimitris E Simos,Rick Kuhn,Artemios G Voyiatzis et al.
Dimitris E Simos et al.
Cybertrust in the IoT Age [0.03%]
物联网时代的网络信任
Jeffrey Voas,Rick Kuhn,Constantinos Kolias et al.
Jeffrey Voas et al.
J Voas,R Kuhn,C Paulsen et al.
J Voas et al.
Just as yeast, flour, water, and salt are to bread, algorithms, data structures, operating systems, database design, compiler design, and programming languages were computer science (CS) education's core ingredients in past years. Then, uni...
Rick Kuhn,Jeff Voas,Dylan Yaga
Rick Kuhn
Blockchains were designed to solve the problem of double-spending in cryptocurrencies, and the success of the Bitcoin design has generated vastly more interest than previous proposals for digital currencies. Blockchains are being used in ot...
From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively [0.03%]
从神经元覆盖到转向角度:有效测试自动驾驶汽车
Jack Toohey,M S Raunak,Dave Binkley
Jack Toohey
A Deep Neural Network (DNN) based system, such as the one used for autonomous vehicle operations, is a "black box" of complex interactions resulting in a classification or prediction. An important question for any such system is how to incr...
CUF-Links: Continuous and Ubiquitous FAIRness Linkages for reproducible research [0.03%]
持续的通用FAIR链接机制促进可重复研究
Ian Foster,Carl Kesselman
Ian Foster
Despite much creative work on methods and tools, reproducibility-the ability to repeat the computational steps used to obtain a research result-remains elusive. One reason for these difficulties is that extant tools for capturing research p...
Steven Furnell,Julie Haney,Mary Theofanos
Steven Furnell
While the threats may appear to be vastly different, further investigation reveals that the cybersecurity community can learn much from the COVID-19 messaging response.
Security Awareness Training for the Workforce: Moving Beyond "Check-the-Box" Compliance [0.03%]
超越“勾选框”合规意识的工作安全培训
Julie Haney,Wayne Lutters
Julie Haney
Security awareness training requirements set a minimum baseline for introducing security practices to an organization's workforce. But is simple compliance enough to result in behavior change?
Zheng Ma,Jiaxin Wu,Sheng-Hua Zhong et al.
Zheng Ma et al.
Human eye movements indicate important spatial information in static images as well as videos. Yet videos contain additional temporal information and convey a storyline. Video summarization is a technique that reduces video size, but mainta...