Sciweavers

1229 search results - page 94 / 246
» Trusted Computing
Sort
View
PERCOM
2010
ACM
14 years 8 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi
JCC
2011
154views more  JCC 2011»
14 years 26 days ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
EDOC
2006
IEEE
15 years 4 months ago
Trust Assessment Using Provenance in Service Oriented Applications
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible ng...
Shrija Rajbhandari, Arnaud Contes, Omer F. Rana, V...
VIZSEC
2005
Springer
15 years 3 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
JUCS
2010
141views more  JUCS 2010»
14 years 8 months ago
Trust-Oriented Composite Service Selection with QoS Constraints
Abstract: In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust...
Lei Li, Yan Wang, Ee-Peng Lim