Sciweavers

1022 search results - page 106 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
CCS
2005
ACM
14 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
CN
2007
172views more  CN 2007»
13 years 10 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
JCIT
2010
158views more  JCIT 2010»
13 years 5 months ago
A Flexible Grid Task Scheduling Algorithm Based on QoS Similarity
s In grid computing, the goals of task scheduling is to achieve high system optimization performance while matching multi-dimension Quiality of Service(QoS) requirement of applicat...
Kunfang Song, Shufen Ruan, Minghua Jiang
ICSE
2004
IEEE-ACM
14 years 10 months ago
SNIAFL: Towards a Static Non-Interactive Approach to Feature Location
To facilitate software maintenance and evolution, a helpful step is to locate features concerned in a particular maintenance task. In the literature, both dynamic and interactive ...
Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yan...
ICCV
2007
IEEE
14 years 4 months ago
PEYE: Toward a Visual Motion Based Perceptual Interface for Mobile Devices
We present the architecture and algorithm design of a visual motion based perceptual interface for mobile devices with cameras. In addition to motion vector, we use the term “vis...
Gang Hua, Ting-Yi Yang, Srinath Vasireddy