Sciweavers

4897 search results - page 112 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
TSMC
2008
113views more  TSMC 2008»
13 years 9 months ago
Computational Methods for Verification of Stochastic Hybrid Systems
Stochastic hybrid system (SHS) models can be used to analyze and design complex embedded systems that operate in the presence of uncertainty and variability. Verification of reacha...
Xenofon D. Koutsoukos, Derek Riley
LICS
2008
IEEE
14 years 3 months ago
A Logical Characterization of Individual-Based Models
Individual-based models are a relatively new approach to modelling dynamical systems of interacting entities, for example molecules in a biological cell. Although they are computa...
James F. Lynch
ICALT
2006
IEEE
14 years 3 months ago
Effective Analysis and Design of Computer-Supported Learning System
The analysis phase constitutes an essential step in the development of information systems. Nevertheless, learning materials design activities currently have reduced the analysis ...
David Díez Cebollero, Camino Fernánd...
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 2 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
ICTAI
2009
IEEE
14 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu