Sciweavers

4897 search results - page 85 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
COGSCI
2007
85views more  COGSCI 2007»
13 years 9 months ago
Semantic Boost on Episodic Associations: An Empirically-Based Computational Model
Words become associated following repeated co-occurrence episodes. This process might be further determined by the semantic characteristics of the words. The present study focused...
Yaron Silberman, Shlomo Bentin, Risto Miikkulainen
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 9 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
DIGRA
2005
Springer
14 years 2 months ago
Extending Soft Models to Game Design: Flow, Challenges and Conflicts
Challenge and conflict are elements that all game designers strive to engineer into their games. Research shows that challenge is what drives a high proportion of games players ye...
Abdennour El Rhalibi, Martin Hanneghan, Stephen Ta...
PRDC
2007
IEEE
14 years 3 months ago
Model Based Development of Safety-Critical Systems Using Template Based Code Generation
Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists...
Matthias Regensburger, Christian Buckl, Alois Knol...
KBSE
2005
IEEE
14 years 2 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra