Sciweavers

2907 search results - page 17 / 582
» Trust analysis with clustering
Sort
View
DALT
2009
Springer
14 years 4 months ago
Declarative and Numerical Analysis of Edge Creation Process in Trust-Based Social Networks
Online social networks are enjoying drastic increase in their population and connectivity. One of the fundamental issues in these networks is trust, which is an essential factor in...
Babak Khosravifar, Jamal Bentahar, Maziar Gomrokch...
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
14 years 4 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 3 months ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...
SIAMJO
2002
83views more  SIAMJO 2002»
13 years 9 months ago
Analysis of Inexact Trust-Region SQP Algorithms
In this paper we extend the design of a class of composite
Matthias Heinkenschloss, Luís N. Vicente