Sciweavers

1022 search results - page 22 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
SAC
2010
ACM
13 years 2 months ago
A new methodology for photometric validation in vehicles visual interactive systems
This work proposes a new methodology for automatically validating the internal lighting system of an automotive, i.e., assessing the visual quality of an instrument cluster (IC) f...
Alexandre W. C. Faria, David Menotti, Daniel S. D....
JTAER
2010
109views more  JTAER 2010»
13 years 6 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...
IEEEARES
2007
IEEE
14 years 1 months ago
From Trust to Dependability through Risk Analysis
The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...
ECBS
2005
IEEE
93views Hardware» more  ECBS 2005»
14 years 1 months ago
Embedded System Engineering Using C/C++ Based Design Methodologies
This paper analyzes and compares the effectiveness of various system level design methodologies in assessing performance of embedded computing systems from the earliest stages of ...
Claudio Talarico, Aseem Gupta, Ebenezer Peter, Jer...
ICSOC
2005
Springer
14 years 1 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...