Sciweavers

575 search results - page 15 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
FLAIRS
2010
13 years 5 months ago
Using Ontologies in Case-Based Activity Recognition
Pervasive computing requires the ability to detect user activity in order to provide situation-specific services. Case-based reasoning can be used for activity recognition by usin...
Stephen Knox, Lorcan Coyle, Simon Dobson
ATAL
2005
Springer
14 years 1 months ago
Task delegation using experience-based multi-dimensional trust
Cooperation among autonomous agents involves an inherent degree of uncertainty. Agents determine for themselves when to initiate cooperation or to assist others, when to rescind c...
Nathan Griffiths
ICPADS
2002
IEEE
14 years 17 days ago
Communication Pattern Based Methodology for Performance Analysis of Termination Detection Schemes
Efficient determination of processing termination at barrier synchronization points can occupy an important role in the overall throughput of parallel and distributed computing sy...
Yili Tseng, Ronald F. DeMara
EUROSEC
2008
ACM
13 years 9 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
DSN
2005
IEEE
13 years 9 months ago
Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems
In general, decision support is one of the main purposes of model-based analysis of systems. Response surface methodology (RSM) is an optimization technique that has been applied ...
Peter Kemper, Dennis Müller, Axel Thümml...