First Page | Document Content | |
---|---|---|
Date: 2017-12-30 21:51:59Metaphysics Humanities Terminology Archaeological theory Data collection Evidence law Museology Provenance Seeds Causality Inode System call | Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow TrackingAdd to Reading ListSource URL: acmccs.github.ioDownload Document from Source WebsiteFile Size: 1,52 MBShare Document on Facebook |
Information Diffusion and Provenance of Interactions in Twitter: Is it only about Retweets? Io Taxidou* Peter M. Fischer* Tom De Nies‡DocID: 1xVN1 - View Document | |
Stabilizing Floating-Point Programs Using Provenance Analysis Yijia Gu(B) and Thomas Wahl College of Computer and Information Science, Boston, USA {guyijia,wahl}@ccs.neu.eduDocID: 1xTsE - View Document | |
Privacy-Preserving Network Provenance Yuankai Zhang Adam O’Neill Georgetown UniversityDocID: 1vr8Y - View Document | |
Knowing Where Your Input is From: Kernel-Level Data-Provenance Verification ? Deian Stefan1 , Chehai Wu2 , Danfeng (Daphne) Yao3 , and Gang Xu4DocID: 1vkvT - View Document | |
Using Trust and Provenance for Content Filtering on the Semantic Web Jennifer Golbeck Aaron MannesDocID: 1vc6k - View Document |