Sciweavers

361 search results - page 44 / 73
» A Vector Model of Trust for Developing Trustworthy Systems
Sort
View
PUC
2006
72views more  PUC 2006»
13 years 8 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
CEC
2005
IEEE
14 years 2 months ago
Genetic programming approach for fault modeling of electronic hardware
This paper presents two variants of Genetic Programming (GP) approaches for intelligent online performance monitoring of electronic circuits and systems. Reliability modeling of el...
Ajith Abraham, Crina Grosan
SECON
2007
IEEE
14 years 2 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
IADIS
2004
13 years 10 months ago
A Model of E-Commerce for the Highly Valuable Traditional Products in Thailand
As e-commerce is considered an excellent alternative for business to reach new customers, interests in design principles for e-commerce websites, are increasing. However, not many...
Sakuna Vanichvisuttikul, Chamnong Jungthirapanich
CHI
2007
ACM
14 years 9 months ago
How it works: a field study of non-technical users interacting with an intelligent system
In order to develop intelligent systems that attain the trust of their users, it is important to understand how users perceive such systems and develop those perceptions over time...
Joe Tullio, Anind K. Dey, Jason Chalecki, James Fo...