Sciweavers

10568 search results - page 416 / 2114
» Computer Intelligence and Formalization
Sort
View
COMPSAC
2006
IEEE
15 years 10 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Multimedia Informal Communication by Wearable Computer based on Real-World Context and Graffiti
The informal information can be so intuitive, emotional, personal, honest and subjective that it is very difficult to get them from the formal media. In this paper, we demonstrate...
Shun'ichi Tano, Tatsuhiro Takayama, Mitsuru Iwata,...
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 10 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
COSIT
2001
Springer
186views GIS» more  COSIT 2001»
15 years 9 months ago
Computational Structure in Three-Valued Nearness Relations
The development of cognitively plausible models of human spatial reasoning may ultimately result in computational systems that are better equipped to meet human needs. This paper e...
Matt Duckham, Michael F. Worboys
APSEC
1999
IEEE
15 years 9 months ago
Capturing Periodic Concurrent Interactions of Mission Computer Tasks
Safety critical systems, such as aviation systems controlled by software, often have hard real-time requirements. Producing the correct resultat the right time is thefundamental g...
Jin Song Dong, Brendan P. Mahony, Neale Fulton