Semantic Scholar uses AI to extract papers important to this topic.
We present a new approach aimed at constraining the typical size and optical properties of carbon dust grains in Circumstellar… Expand In recent years, formal certification programs for rating and evaluating the sustainability and energy efficiency of buildings… Expand Today's technical and legal landscape presents formidable challenges to personal data privacy. First, our increasing reliance on… Expand Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real… Expand This paper investigates trust in the scientists, government authorities and wider risk management team during the ongoing… Expand This paper focuses on the problem of dealing with privacy obligations in enterprises. Privacy obligations dictate expected… Expand We describe the specification, implementation and proof of correctness of a code generator for a subset of Gypsy 2.05. The code… Expand Using a detailed radiative transfer analysis, combined with an energy balance equation for the gas, we have performed extensive… Expand This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is considered to be a subjective… Expand Where you can find the guide to understanding covert channel analysis of trusted systems easily? Is it in the book store? On-line… Expand