Sciweavers

274 search results - page 18 / 55
» Developing a Model for Trust Management in Pervasive Devices
Sort
View
SASO
2008
IEEE
15 years 4 months ago
Nature-Inspired Spatial Metaphors for Pervasive Service Ecosystems
Innovative paradigms and frameworks have to be identified to enable the effective deployment and execution of pervasive computing services. Such frameworks must be conceived so a...
Cynthia Villalba, Alberto Rosi, Mirko Viroli, Fran...
ICSM
2000
IEEE
15 years 2 months ago
A Deployment System for Pervasive Computing
Software has for a long time been used for controlling different systems. Today, there is a trend towards integrating software into consumer electronics, home appliances, cars etc...
Jesper Andersson
HIPC
2005
Springer
15 years 3 months ago
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Haimonti Dutta, Hillol Kargupta, Anupam Joshi
IDTRUST
2010
ACM
14 years 8 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
WWW
2005
ACM
15 years 10 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu