Sciweavers

947 search results - page 153 / 190
» HMM-Based Trust Model
Sort
View
79
Voted
CCS
1994
ACM
15 years 4 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
97
Voted
FOSAD
2000
Springer
15 years 4 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
ECIS
2003
15 years 1 months ago
Adoption trends in application service provisioning: an exploratory field study of small and medium-size enterprises
This paper describes an exploratory field study on the adoption of Application Service Provisioning (ASP) in Small and Medium-sized Enterprises (SMEs). Rooted in Merton’s Motiva...
Ryan Peterson, Alea M. Fairchild
106
Voted
HUC
2010
Springer
15 years 21 days ago
Toolkit to support intelligibility in context-aware applications
Context-aware applications should be intelligible so users can better understand how they work and improve their trust in them. However, providing intelligibility is nontrivial an...
Brian Y. Lim, Anind K. Dey
CPHYSICS
2004
85views more  CPHYSICS 2004»
15 years 11 days ago
Beyond benchmarking - how experiments and simulations can work together in plasma physics
There has been dramatic progress in the scope and power of plasma simulations in recent years; and because codes are generally cheaper to write, to run and to diagnose than experi...
Martin Greenwald