Sciweavers

575 search results - page 14 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
RAID
2004
Springer
14 years 29 days ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
IJAR
2007
104views more  IJAR 2007»
13 years 7 months ago
On representation and aggregation of social evaluations in computational trust and reputation models
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
Jordi Sabater-Mir, Mario Paolucci
AINA
2007
IEEE
14 years 2 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
EUSFLAT
2003
108views Fuzzy Logic» more  EUSFLAT 2003»
13 years 9 months ago
Soft computing and control of district heating system
The article deals with the possible methodology of processing of data and information for the search of prediction of heat supply daily diagram (HSDD). The methodology includes te...
Petr Dostál, Bronislav Chramcov, Jaroslav B...
PE
2008
Springer
167views Optimization» more  PE 2008»
13 years 7 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi