Sciweavers

744 search results - page 110 / 149
» The Traust Authorization Service
Sort
View
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
15 years 4 months ago
Modeling Quality of Information in Multi-sensor Surveillance Systems
Current surveillance systems use multiple sensors and media processing techniques in order to record/detect information of interest in terms of events. Assessing the quality of in...
M. Anwar Hossain, Pradeep K. Atrey, Abdulmotaleb E...
NBIS
2007
Springer
15 years 3 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
OTM
2007
Springer
15 years 3 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
SPIN
2007
Springer
15 years 3 months ago
Model Extraction for ARINC 653 Based Avionics Software
One of the most exciting and promising approaches to ensure the correctness of critical systems is software model checking, which considers real code, written with standard program...
Pedro de la Cámara, María-del-Mar Ga...
CCGRID
2006
IEEE
15 years 3 months ago
Virtual Clusters for Grid Communities
A challenging issue facing Grid communities is that while Grids can provide access to many heterogeneous resources, the resources to which access is provided often do not match th...
Ian T. Foster, Timothy Freeman, Katarzyna Keahey, ...