Sciweavers

947 search results - page 175 / 190
» HMM-Based Trust Model
Sort
View
PUC
2006
72views more  PUC 2006»
13 years 8 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
IJMI
2007
134views more  IJMI 2007»
13 years 8 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
IJNSEC
2007
111views more  IJNSEC 2007»
13 years 8 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
JMM
2007
107views more  JMM 2007»
13 years 8 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
SIMULATION
1998
177views more  SIMULATION 1998»
13 years 8 months ago
Simulation and Planning of an Intermodal Container Terminal
A decision support system for the management of an intermodal container terminal is presented. Among the problems to be solved, there are the spatial allocation of containers on t...
Luca Maria Gambardella, Andrea Emilio Rizzoli, Mar...