Sciweavers

3686 search results - page 12 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ITRUST
2005
Springer
14 years 1 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
IWEC
2004
13 years 9 months ago
New Behavioural Approaches for Virtual Environments
We describe a new approach to the behaviour of 3D environments that supports the definition of physical processes and interactive phenomena. The work takes as a starting point the ...
Marc Cavazza, Simon Hartley, Jean-Luc Lugrin, Paol...
DATE
2008
IEEE
145views Hardware» more  DATE 2008»
14 years 2 months ago
Minimizing Virtual Channel Buffer for Routers in On-chip Communication Architectures
We present a novel methodology for design space exploration using a two-steps scheme to optimize the number of virtual channel buffers (buffers take the premier share of the route...
Mohammad Abdullah Al Faruque, Jörg Henkel
SAC
2005
ACM
14 years 1 months ago
A trust-enhanced recommender system application: Moleskiing
Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity bet...
Paolo Avesani, Paolo Massa, Roberto Tiella
IAT
2003
IEEE
14 years 28 days ago
Virtual Enterprise Formation with Agents - an Approach to Implementation
The formation of a Virtual Enterprise and the selection of its partners is an important process in the lifecycle of a Virtual Enterprise. In this paper, we present the Virtual Ent...
Sobah Abbas Petersen, Jinghai Rao, Mihhail Matskin