Sciweavers

575 search results - page 20 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
ISCAS
2006
IEEE
65views Hardware» more  ISCAS 2006»
14 years 1 months ago
Symbolic analysis of bifurcations in planar variable structure systems
— In this paper a methodology to the analysis of bifurcations of variable structure systems is proposed. This methodology, based on the use of symbolic computation packages, is d...
Ubirajara F. Moreno, Eugênio B. Castelan, Ed...
VIZSEC
2005
Springer
14 years 1 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
SNPD
2007
13 years 9 months ago
Parallel analysis of polymorphic viral code using automated deduction system
As malicious code has become more sophisticated and pervasive, faster and more effective system for forensics and prevention is important. Particularly, quick analysis of polymorp...
Ruo Ando
PERCOM
2007
ACM
14 years 7 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
ICDE
2007
IEEE
139views Database» more  ICDE 2007»
14 years 1 months ago
Integrating OLAP and Ranking: The Ranking-Cube Methodology
OLAP (On-Line Analytical Processing) and Ranking are currently separate technologies in the database systems. OLAP emphasizes on efficient multidimensional data analysis and ranki...
Dong Xin, Jiawei Han