Sciweavers

1229 search results - page 171 / 246
» Trusted Computing
Sort
View
SEMWEB
2009
Springer
14 years 1 months ago
Semantic Web Service Composition in Social Environments
This paper describes how to generate compositions of semantic Web services using social trust information from user ratings of the services. We present a taxonomy of features, suc...
Ugur Kuter, Jennifer Golbeck
FSTTCS
2009
Springer
14 years 3 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
CVPR
2007
IEEE
14 years 11 months ago
Solving Large Scale Binary Quadratic Problems: Spectral Methods vs. Semidefinite Programming
In this paper we introduce two new methods for solving binary quadratic problems. While spectral relaxation methods have been the workhorse subroutine for a wide variety of comput...
Carl Olsson, Anders P. Eriksson, Fredrik Kahl
CHI
2004
ACM
14 years 9 months ago
Collision warning design to mitigate driver distraction
As computers and other information technology move into cars and trucks, distraction-related crashes are likely to become an important problem. This paper begins to address this p...
John D. Lee, Joshua D. Hoffman, Elizabeth Hayes