Sciweavers

9071 search results - page 1717 / 1815
» A co-design modeling approach for computer network systems
Sort
View
IDTRUST
2009
ACM
15 years 4 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
ATAL
2009
Springer
15 years 4 months ago
Hedonic coalition nets
In hedonic games, players have the opportunity to form coalitions, and have preferences over the coalitions they might join. Such games can be used to model a variety of settings ...
Edith Elkind, Michael Wooldridge
CEC
2008
IEEE
15 years 4 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
HICSS
2008
IEEE
158views Biometrics» more  HICSS 2008»
15 years 4 months ago
Consensual Dynamics in Group Decision Making with Triangular Fuzzy Numbers
In this paper we study the modelling of consensus reaching in a ‘soft’ environment, i.e. when the individual testimonies are expressed as fuzzy preference relations. Here cons...
Mario Fedrizzi, Michele Fedrizzi, Ricardo A. Marqu...
LCPC
2007
Springer
15 years 4 months ago
Multidimensional Blocking in UPC
Abstract. Partitioned Global Address Space (PGAS) languages offer an attractive, high-productivity programming model for programming large-scale parallel machines. PGAS languages, ...
Christopher Barton, Calin Cascaval, George Alm&aac...
« Prev « First page 1717 / 1815 Last » Next »