Sciweavers

575 search results - page 9 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
Accelerating Scientific Applications with the SRC-6 Reconfigurable Computer: Methodologies and Analysis
Reconfigurable computing offers the promise of performing computations in hardware to increase performance and efficiency while retaining much of the flexibility of a software sol...
Melissa C. Smith, Jeffrey S. Vetter, Xuejun Liang
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 27 days ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
IEEEARES
2007
IEEE
14 years 1 months ago
From Trust to Dependability through Risk Analysis
The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...
PERVASIVE
2006
Springer
13 years 7 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
MONET
2010
170views more  MONET 2010»
13 years 6 months ago
A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications
The vehicle sector is one of the most exciting application areas for wireless ad hoc networks and pervasive computing technologies. Vehicles are constantly being equipped with more...
Antonio Coronato, Giuseppe De Pietro, Jong Hyuk Pa...