Sciweavers

947 search results - page 122 / 190
» HMM-Based Trust Model
Sort
View
UM
2007
Springer
15 years 6 months ago
To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications
User’s privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model wh...
Giuseppe Lugano, Pertti Saariluoma
79
Voted
BPM
2003
Springer
75views Business» more  BPM 2003»
15 years 5 months ago
Security in Business Process Engineering
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Michael Backes, Birgit Pfitzmann, Michael Waidner
108
Voted
FMCO
2007
Springer
124views Formal Methods» more  FMCO 2007»
15 years 4 months ago
Certification Using the Mobius Base Logic
This paper describes a core component of Mobius' Trusted Code Base, the Mobius base logic. This program logic facilitates the transmission of certificates that are generated u...
Lennart Beringer, Martin Hofmann, Mariela Pavlova
96
Voted
GECCO
2010
Springer
180views Optimization» more  GECCO 2010»
15 years 4 months ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noisy testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros
182
Voted
AISM
2004
15 years 2 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren