Sciweavers

1022 search results - page 30 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
ATAL
2008
Springer
13 years 9 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
ACMSE
2004
ACM
14 years 1 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
EUSFLAT
2003
108views Fuzzy Logic» more  EUSFLAT 2003»
13 years 9 months ago
Soft computing and control of district heating system
The article deals with the possible methodology of processing of data and information for the search of prediction of heat supply daily diagram (HSDD). The methodology includes te...
Petr Dostál, Bronislav Chramcov, Jaroslav B...
WETICE
2003
IEEE
14 years 28 days ago
DEVISE: A Methodology for Building Web Services Based Infrastructure for Collaborative Enterprises
Web Services define a new paradigm in present-day collaborative application development in enterprises, and span systems, networks, and organizations. Emerging computing infrastru...
N. Dhyanesh, G. C. Vineel, S. V. Raghavan
CCS
2009
ACM
14 years 8 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...