Sciweavers

373 search results - page 2 / 75
» Trustworthy Information: Concepts and Mechanisms
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
IEEECIT
2007
IEEE
14 years 1 months ago
A Mechanism for Improving Web Server Performance Using Fuzzy Concept
This paper presents a mechanism to improve Web server performance with fuzzy-based techniques. A load balancing mechanism based on the fuzzy control technique is developed in such...
Bumjoo Park, Kiejin Park, Dongmin Shin, Sungsoo Ki...
ICWE
2009
Springer
14 years 2 months ago
Trust and Reputation Mining in Professional Virtual Communities
Abstract. Communication technologies, such as e-mail, instant messaging, discussion forums, blogs, and newsgroups connect people together, forming virtual communities. This concept...
Florian Skopik, Hong Linh Truong, Schahram Dustdar
ICSE
2007
IEEE-ACM
14 years 7 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
JAIR
2011
133views more  JAIR 2011»
13 years 2 months ago
A Probabilistic Approach for Maintaining Trust Based on Evidence
Leading agent-based trust models address two important needs. First, they show how an agent may estimate the trustworthiness of another agent based on prior interactions. Second, ...
Yonghong Wang, Chung-Wei Hang, Munindar P. Singh