Sciweavers

334 search results - page 62 / 67
» Survey of trust models in different network domains
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
CHI
2004
ACM
14 years 8 months ago
User profiling
A number of global trends have a large influence on the way we use technology in our life and work, like: ? increasing connectivity and connected devices (any time, any place, any...
Johan Schuurmans, Boris E. R. de Ruyter, Harry van...
SDM
2009
SIAM
291views Data Mining» more  SDM 2009»
14 years 4 months ago
Detection and Characterization of Anomalies in Multivariate Time Series.
Anomaly detection in multivariate time series is an important data mining task with applications to ecosystem modeling, network traffic monitoring, medical diagnosis, and other d...
Christopher Potter, Haibin Cheng, Pang-Ning Tan, S...
CLUSTER
2009
IEEE
14 years 2 months ago
An innovative application execution toolkit for multicluster grids
—Multicluster grids provide one promising solution to satisfying growing computation demands of compute-intensive applications by collaborating various networked clusters. Howeve...
Zhifeng Yun, Zhou Lei, Gabrielle Allen, Daniel S. ...
EMSOFT
2004
Springer
14 years 28 days ago
Reuse of software in distributed embedded automotive systems
Until recently, in the automotive industry, reuse of software has entirely been a typical activity of suppliers. They try to reduce the increasing software development costs that ...
Bernd Hardung, Thorsten Kölzow, Andreas Kr&uu...