Sciweavers

1102 search results - page 116 / 221
» Bayesian Network Trust Model in Peer-to-Peer Networks
Sort
View
ISM
2008
IEEE
159views Multimedia» more  ISM 2008»
13 years 9 months ago
Adaptive Modeling of a User's Daily Life with a Wearable Sensor Network
In an environment where the contexts of users are complex and the degree of freedom of user activity is very high, such as in daily life, several factors need to be considered for...
Hyoungnyoun Kim, Ig-Jae Kim, Hyoung-Gon Kim, Ji-Hy...
USS
2008
13 years 11 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
TPDS
2008
116views more  TPDS 2008»
13 years 9 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
ICML
2002
IEEE
14 years 9 months ago
Exact model averaging with naive Bayesian classifiers
The naive classifier is a well-established mathematical model whose simplicity, speed and accuracy have made it a popular choice for classification in AI and engineering. In this ...
Denver Dash, Gregory F. Cooper
CEC
2007
IEEE
14 years 1 months ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...