Sciweavers

178 search results - page 11 / 36
» Dependability Arguments with Trusted Bases
Sort
View
ACMSE
2004
ACM
14 years 25 days ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
13 years 7 months ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar
AIIA
2009
Springer
13 years 10 months ago
Representing Excuses in Social Dependence Networks
In this paper, we propose a representation of excuses in the context of multiagent systems. We distinguish five classes of excuses, taking as starting point both jurisprudential an...
Guido Boella, Jan Broersen, Leendert van der Torre...
TACAS
2005
Springer
158views Algorithms» more  TACAS 2005»
14 years 26 days ago
Symstra: A Framework for Generating Object-Oriented Unit Tests Using Symbolic Execution
Object-oriented unit tests consist of sequences of method invocations. Behavior of an invocation depends on the method’s arguments and the state of the receiver at the beginning ...
Tao Xie, Darko Marinov, Wolfram Schulte, David Not...
FC
2001
Springer
123views Cryptology» more  FC 2001»
13 years 12 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath