Sciweavers

1022 search results - page 15 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
AIRWEB
2007
Springer
14 years 1 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
ICSOC
2004
Springer
14 years 1 months ago
Toward autonomic web services trust and selection
Emerging Web services standards enable the development of large-scale applications in open environments. In particular, they enable services to be dynamically bound. However, curr...
E. Michael Maximilien, Munindar P. Singh
CCS
2007
ACM
13 years 11 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
ANCS
2006
ACM
14 years 1 months ago
A methodology for evaluating runtime support in network processors
Modern network processor systems require the ability to adapt their processing capabilities at runtime to changes in network traffic. Traditionally, network processor applications...
Xin Huang, Tilman Wolf
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
14 years 2 months ago
Towards a Methodology for Service Construction
— All large vendors of standard business software have announced to move to service oriented architecture. They claim benefits for their customers with regard to agility and ope...
Joachim Schelp, Robert Winter