Sciweavers

1117 search results - page 136 / 224
» A Compliance Model of Trust
Sort
View
ICDCIT
2004
Springer
15 years 7 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
SIGUCCS
1999
ACM
15 years 6 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
SCALESPACE
2005
Springer
15 years 7 months ago
Image Deblurring in the Presence of Salt-and-Pepper Noise
The problem of image deblurring in the presence of salt and pepper noise is considered. Standard image deconvolution algorithms, that are designed for Gaussian noise, do not perfor...
Leah Bar, Nir A. Sochen, Nahum Kiryati
WSC
2007
15 years 4 months ago
Distributed simulation for interoperability testing along the supply chain
The need for interoperability of information systems among supply chain partners has been recognized. A number of standards have been or are being developed to ensure interoperabi...
Sanjay Jain, Frank Riddick, Andreas Craens, Deogra...
AAMAS
2007
Springer
15 years 2 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh