Resco: Automatic Collection of Leaked Resources

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Markets for leaked information

Markets for leaked information* We study markets for sensitive personal information. An agent wants to communicate with another party but any revealed information can be intercepted and sold to a third party whose reaction harms the agent. The market for information induces an adverse sorting effect, allocating the information to those types of third parties who harm the agent most. In equilibr...

متن کامل

Automatic Collection of Failure Traces

Software bugs are a major cause of system downtime. To improve the quality of software, we have to find costeffective ways to locate and fix software bugs. Automatic tracing of real software executions in which software bugs are triggered would be most helpful. This would, for example, help us to focus on patching bugs that are triggered in practice and would speed up locating software bugs. So...

متن کامل

Feasibility for Automatic Data Collection

It is argued that the data collection process is the most crucial and time consuming stage in the model building process. This is primarily due to the influence that data has in providing accurate simulation results. Data collection is an extremely time consuming process predominantly because the task is manually orientated. Hence, automating this process of data collection would be extremely a...

متن کامل

Issues in Automatic Provenance Collection

Automatic provenance collection describes systems that observe processes and data transformations inferring, collecting, and maintaining provenance about them. Automatic collection is a powerful tool for analysis of objects and processes, providing a level of transparency and pervasiveness not found in more conventional provenance systems. Unfortunately, automatic collection is also difficult. ...

متن کامل

Resources, garbage-collection and the π-calculus

Techniques such as mobility and distribution are often used to overcome limitations of resources such as the amount of memory or the necessity for specialised devices. Indeed, questions related to such limitations are crucial in matters of security, compilation and quality of service. However, few attempts have been made at formalising this notion of resource limitation in presence of mobility,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Information and Systems

سال: 2013

ISSN: 0916-8532,1745-1361

DOI: 10.1587/transinf.e96.d.28