Sciweavers

230 search results - page 3 / 46
» Trust Modeling with Context Representation and Generalized I...
Sort
View
SAINT
2003
IEEE
13 years 11 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
JHSN
2006
267views more  JHSN 2006»
13 years 6 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
KESAMSTA
2010
Springer
13 years 4 months ago
Trust Estimation Using Contextual Fitness
Trust estimation is an essential process in several multi-agent systems domains. Although it is generally accepted that trust is situational, the majority of the Computational Trus...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
AI
2005
Springer
13 years 11 months ago
Probability and Equality: A Probabilistic Model of Identity Uncertainty
Identity uncertainty is the task of deciding whether two descriptions correspond to the same object. In this paper we discuss the identity uncertainty problem in the context of the...
Rita Sharma, David Poole
ICRA
2006
IEEE
149views Robotics» more  ICRA 2006»
14 years 8 days ago
On Learning the Statistical Representation of a Task and Generalizing it to Various Contexts
— This paper presents an architecture for solving generically the problem of extracting the constraints of a given task in a programming by demonstration framework and the problem...
Sylvain Calinon, Florent Guenter, Aude Billard