Sciweavers

335 search results - page 60 / 67
» Biometrics and Security
Sort
View
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 5 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 5 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 5 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 5 months ago
Blackout Mitigation Assessment in Power Transmission Systems
Electric power transmission systems are a key infrastructure and blackouts of these systems have major direct and indirect consequences on the economy and national security. Analy...
Benjamin A. Carreras, Vickie E. Lynch, David E. Ne...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 5 months ago
Locational Pricing and Scheduling for an Integrated Energy-Reserve Market
It is well known that given a network that can become constrained on voltage or real power flows, reserves must also be spatially located in order to handle all credible contingen...
Jie Chen, James S. Thorp, Robert J. Thomas, Timoth...