Sciweavers

1229 search results - page 35 / 246
» Trusted Computing
Sort
View
JUCS
2010
82views more  JUCS 2010»
13 years 2 months ago
Trusted Computing
Peter Lipp
TJS
2011
71views more  TJS 2011»
13 years 2 months ago
Automatically constructing trusted cluster computing environment
Yongwei Wu, Chen Gang, Jia Liu, Rui Fang, Xiaomeng...
CHI
2004
ACM
14 years 8 months ago
How to trust robots further than we can throw them
Panelists with backgrounds in diverse aspects of humanrobot interaction will discuss the challenges of human-robot interaction in terms of operator trust. The panel will showcase ...
David J. Bruemmer, Douglas A. Few, Michael A. Good...
DMSN
2010
ACM
13 years 7 months ago
Provenance-based trustworthiness assessment in sensor networks
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino
AINA
2007
IEEE
14 years 2 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...