Sciweavers

2907 search results - page 27 / 582
» Trust analysis with clustering
Sort
View
PRL
2006
249views more  PRL 2006»
13 years 10 months ago
Image segmentation by histogram thresholding using hierarchical cluster analysis
This paper proposes a new method of image thresholding by using cluster organization from the histogram of an image. A new similarity measure proposed is based on inter-class vari...
Agus Zainal Arifin, Akira Asano
ESOP
2004
Springer
14 years 3 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
TGC
2007
Springer
14 years 4 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
KES
2005
Springer
14 years 3 months ago
Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data
Clustering for the analysis of the gene expression profiles has been used for identifying the functions of the genes and of unknown genes. Since the genes usually belong to multipl...
Kyung-Joong Kim, Si-Ho Yoo, Sung-Bae Cho