Sciweavers

989 search results - page 139 / 198
» An information-based model for trust
Sort
View
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 25 days ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
OWLED
2007
15 years 13 days ago
Extending Fuzzy Description Logics for the Semantic Web
Fuzzy Description Logics (Fuzzy DLs) and fuzzy OWL have been proposed as languages able to represent and reason about imprecise and vague knowledge. Such extensions have gained con...
Giorgos Stoilos, Giorgos B. Stamou
131
Voted
HERCMA
2001
141views Mathematics» more  HERCMA 2001»
15 years 12 days ago
Towards an ISO-9000 compliant certification service provider
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
ICIS
2001
15 years 12 days ago
Looking Without Seeing: Understanding Unsophisticated Consumers' Success and Failure to Detect Internet Deception
Do unsophisticated consumers fall prey to Internet consumer frauds? Why? To answer these questions this paper integrates two streams of empirical research: the process-oriented th...
Stefano Grazioli, Alex Wang
GECCO
2010
Springer
225views Optimization» more  GECCO 2010»
14 years 11 months ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noiseless testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros