Sciweavers

1229 search results - page 98 / 246
» Trusted Computing
Sort
View
CCS
2004
ACM
15 years 3 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ICSOC
2004
Springer
15 years 3 months ago
Toward autonomic web services trust and selection
Emerging Web services standards enable the development of large-scale applications in open environments. In particular, they enable services to be dynamically bound. However, curr...
E. Michael Maximilien, Munindar P. Singh
ISCAPDCS
2004
14 years 11 months ago
A Reputation-based Trust Management in Peer-to-Peer Network Systems
Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal ba...
Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong...
IJON
2007
93views more  IJON 2007»
14 years 10 months ago
How much can we trust neural simulation strategies?
Despite a steady improvement of computational hardware, results of numerical simulation are still tightly bound to the simulation tool and strategy used, and may substantially var...
Michelle Rudolph, Alain Destexhe
SIAMMAX
2011
141views more  SIAMMAX 2011»
14 years 24 days ago
Best Low Multilinear Rank Approximation of Higher-Order Tensors, Based on the Riemannian Trust-Region Scheme
Higher-order tensors are used in many application fields, such as statistics, signal processing, and scientific computing. Efficient and reliable algorithms for manipulating thes...
Mariya Ishteva, Pierre-Antoine Absil, Sabine Van H...