Resco: Automatic Collection of Leaked Resources
نویسندگان
چکیده
منابع مشابه
Markets for leaked information
Markets for leaked information* We study markets for sensitive personal information. An agent wants to communicate with another party but any revealed information can be intercepted and sold to a third party whose reaction harms the agent. The market for information induces an adverse sorting effect, allocating the information to those types of third parties who harm the agent most. In equilibr...
متن کاملAutomatic Collection of Failure Traces
Software bugs are a major cause of system downtime. To improve the quality of software, we have to find costeffective ways to locate and fix software bugs. Automatic tracing of real software executions in which software bugs are triggered would be most helpful. This would, for example, help us to focus on patching bugs that are triggered in practice and would speed up locating software bugs. So...
متن کاملFeasibility for Automatic Data Collection
It is argued that the data collection process is the most crucial and time consuming stage in the model building process. This is primarily due to the influence that data has in providing accurate simulation results. Data collection is an extremely time consuming process predominantly because the task is manually orientated. Hence, automating this process of data collection would be extremely a...
متن کاملIssues in Automatic Provenance Collection
Automatic provenance collection describes systems that observe processes and data transformations inferring, collecting, and maintaining provenance about them. Automatic collection is a powerful tool for analysis of objects and processes, providing a level of transparency and pervasiveness not found in more conventional provenance systems. Unfortunately, automatic collection is also difficult. ...
متن کاملResources, garbage-collection and the π-calculus
Techniques such as mobility and distribution are often used to overcome limitations of resources such as the amount of memory or the necessity for specialised devices. Indeed, questions related to such limitations are crucial in matters of security, compilation and quality of service. However, few attempts have been made at formalising this notion of resource limitation in presence of mobility,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2013
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e96.d.28