Sciweavers

4897 search results - page 93 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
TSMC
2002
134views more  TSMC 2002»
13 years 8 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
CSE
2009
IEEE
14 years 4 months ago
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
Abstract—Vocabulary alignment is a main challenge in distributed access control as peers should understand each other’s policies unambiguously. Ontologies enable mutual underst...
Daniel Trivellato, Fred Spiessens, Nicola Zannone,...
CIS
2006
Springer
14 years 29 days ago
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed inform...
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyu...
ENTCS
2008
110views more  ENTCS 2008»
13 years 9 months ago
Exploring an Option Space to Engineer a Ubiquitous Computing System
Engineering natural and appropriate interactive behaviour in ubiquitous computing systems presents new challenges to their developers. This paper explores formal models of interac...
Michael D. Harrison, Christian Kray, José C...
CEEMAS
2007
Springer
14 years 3 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...