派博傳思國際中心

標(biāo)題: Titlebook: Autonomic and Trusted Computing; 7th International Co Bing Xie,Juergen Branke,Xingshe Zhou Conference proceedings 2010 The Editor(s) (if ap [打印本頁]

作者: chondrocyte    時(shí)間: 2025-3-21 18:20
書目名稱Autonomic and Trusted Computing影響因子(影響力)




書目名稱Autonomic and Trusted Computing影響因子(影響力)學(xué)科排名




書目名稱Autonomic and Trusted Computing網(wǎng)絡(luò)公開度




書目名稱Autonomic and Trusted Computing網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Autonomic and Trusted Computing被引頻次




書目名稱Autonomic and Trusted Computing被引頻次學(xué)科排名




書目名稱Autonomic and Trusted Computing年度引用




書目名稱Autonomic and Trusted Computing年度引用學(xué)科排名




書目名稱Autonomic and Trusted Computing讀者反饋




書目名稱Autonomic and Trusted Computing讀者反饋學(xué)科排名





作者: 消音器    時(shí)間: 2025-3-21 21:36

作者: 新娘    時(shí)間: 2025-3-22 02:56

作者: 舊石器    時(shí)間: 2025-3-22 07:11

作者: 太空    時(shí)間: 2025-3-22 09:25
Trustworthy Organic Computing Systems: Challenges and Perspectivesd and therefore are subject to unforeseeable change during the systems’ runtime. Thus, completely new challenges to the verification and validation of such systems as well as for interactions between system components and, of course, between the system and the user arise. These challenges can be sub
作者: 舉止粗野的人    時(shí)間: 2025-3-22 14:36

作者: 變白    時(shí)間: 2025-3-22 18:22
Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Servicegregation are incurred. Therefore, if the concept of P2P (Peer-to-Peer) resource sharing can be used on conferencing services, the system loading will be distributed and the system fault torrent will be improved. However, in a general DHT (Distributed Hash Table) P2P network, e.g. Chord, the geograp
作者: negligence    時(shí)間: 2025-3-22 23:33

作者: mastopexy    時(shí)間: 2025-3-23 02:10
Context Based Trust Normalization in Service-Oriented Environmentsen there are a few sellers or service providers providing the same product/service, the buyer or service client would like to request the trust management authority to provide trust values of sellers or service providers, which are based on the ratings reflecting the quality of previous transactions
作者: humectant    時(shí)間: 2025-3-23 06:06
A Framework for Trust Enabled Software Asset Retrieval these software assets. Therefore, an effective asset retrieval mechanism is needed to select and reuse trustworthy software assets. In this paper, we introduce the idea of trust management into Software Asset Repository (SAR) and propose a framework for trust-enabled software assets retrieval. The
作者: 一起    時(shí)間: 2025-3-23 10:41

作者: keloid    時(shí)間: 2025-3-23 15:39
A Risk-Aware Resource Service Decision Strategy for Global Computingrmation before providing services for resource requesters. Although many trust management models have been proposed to deal with security concerned in resource service, few of them take risk into consideration. In those schemes involving risk, either risk is discussed conceptually, or methods for ca
作者: GLOOM    時(shí)間: 2025-3-23 19:46
Message Race Detection for Web Services by an SMT-Based Analysised by four factors: security, privacy, reliability and business integrity. Web Services use message-passing for communication which opens the door for messages races. Messages race with each other when their order of arrival at a destination is not guaranteed and is affected non-deterministically by
作者: cushion    時(shí)間: 2025-3-23 22:58
A User-Oriented Approach to Assessing Web Service Trustworthinesserception of users. However accurate assessment for service trustworthiness from user’s perception is a difficult problem, since user perception of a particular Web service varies in terms of users, application scenarios and time. In this paper, we present a user oriented Web service trustworthiness
作者: Projection    時(shí)間: 2025-3-24 02:45
Improving the Trustworthiness of Service QoS Information in Service-Based Systems are composed of available services. Besides services’ capabilities, the qualities of services (QoS) also need to be considered in service composition in order to have high-quality workflows. The QoS profiles of services provided by their service providers may be inaccurate. In this paper, an approa
作者: 無意    時(shí)間: 2025-3-24 06:44
Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Softwaretware trustworthiness is presented. Software under evaluation is compared with some predefined norms and is assigned to one of trust levels. The entire evaluating process is described, including definition of problem situation and formulation, determination of the model and its parameters, and the a
作者: diathermy    時(shí)間: 2025-3-24 13:29

作者: JEER    時(shí)間: 2025-3-24 15:30

作者: 體貼    時(shí)間: 2025-3-24 19:36
Design and Analysis of “Flexible” ,-out-of-, Signaturesnstruction guarantees that a single signer can close at most one ring so the result of the combination is the required (.,.)-ring signature. This construction is useful in, for example, electronic negotiations or games where gradual revelation on how many people signed a given document is required.
作者: 小步走路    時(shí)間: 2025-3-25 00:49
0302-9743 and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable c
作者: arousal    時(shí)間: 2025-3-25 04:15
Identification Using Mathematical Modeling,e evaluating process is described, including definition of problem situation and formulation, determination of the model and its parameters, and the application of the model. A metric for trustworthiness and an attributes weighting method are also presented. Some practical considerations are discussed in the final part of the paper.
作者: 豐富    時(shí)間: 2025-3-25 10:05
Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Softwaree evaluating process is described, including definition of problem situation and formulation, determination of the model and its parameters, and the application of the model. A metric for trustworthiness and an attributes weighting method are also presented. Some practical considerations are discussed in the final part of the paper.
作者: 叢林    時(shí)間: 2025-3-25 11:48

作者: 委托    時(shí)間: 2025-3-25 15:58

作者: conformity    時(shí)間: 2025-3-25 22:52
Simplicity, Economy, and Intensity,rs, advantages for the formal specification. We present how the specification of self-x behavior can be integrated into an approach for compositional verification of concurrent systems, based on Interval Temporal Logic. The presented approach has full tool support with the KIV interactive theorem prover.
作者: Vulnerary    時(shí)間: 2025-3-26 03:26

作者: 存在主義    時(shí)間: 2025-3-26 04:47
Conference proceedings 2010ome - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exh
作者: Embolic-Stroke    時(shí)間: 2025-3-26 11:59
https://doi.org/10.1007/978-981-287-411-5l which consist of a structural description as well as an extensive set of constraints. The constraints specify a correct system structure and are also used in the self-healing activities. We exemplify the self-healing approach using the adaptive cruise control system of modern cars.
作者: 丑惡    時(shí)間: 2025-3-26 14:47
https://doi.org/10.1007/978-94-010-3449-4isplaying an application’s reputation value and/or a user’s individual trust value could assist in the usage of mobile applications with different importance. We also discuss the possible reasons that caused the different effects in two countries.
作者: 花爭吵    時(shí)間: 2025-3-26 19:24

作者: nauseate    時(shí)間: 2025-3-26 22:48
How Just Is Justice? Ask a Psycholinguist,carry and forward mechanism. We discuss the implementation of the framework and experiment with a gnutella style P2P file sharing application in a disconnected MANET. Our results provide important insight into the key challenges and short-comings face by researchers and engineers when designing and deploying such systems.
作者: Diastole    時(shí)間: 2025-3-27 04:05
José Ruiz,Salvador Espa?a,Pedro Garcíar approach is based on identifying the deviation between the QoS profiles of the services claimed by their service providers and the QoS profiles determined by monitors and service user feedbacks. An example is given to illustrate the approach.
作者: 腫塊    時(shí)間: 2025-3-27 06:25

作者: circuit    時(shí)間: 2025-3-27 11:14
Designing Self-healing in Automotive Systemsl which consist of a structural description as well as an extensive set of constraints. The constraints specify a correct system structure and are also used in the self-healing activities. We exemplify the self-healing approach using the adaptive cruise control system of modern cars.
作者: Arboreal    時(shí)間: 2025-3-27 13:41
Effects of Displaying Trust Information on Mobile Application Usageisplaying an application’s reputation value and/or a user’s individual trust value could assist in the usage of mobile applications with different importance. We also discuss the possible reasons that caused the different effects in two countries.
作者: 彈藥    時(shí)間: 2025-3-27 19:34
A Framework for Trust Enabled Software Asset Retrievalal and personalized asset trustworthiness evaluation and retrieval in SAR. We present the experiments of this framework in Trusted Software Asset Repository of Peking University, and a case study is given in this paper.
作者: nonplus    時(shí)間: 2025-3-27 22:55

作者: 最初    時(shí)間: 2025-3-28 03:02
Improving the Trustworthiness of Service QoS Information in Service-Based Systemsr approach is based on identifying the deviation between the QoS profiles of the services claimed by their service providers and the QoS profiles determined by monitors and service user feedbacks. An example is given to illustrate the approach.
作者: 笨重    時(shí)間: 2025-3-28 08:59

作者: 艱苦地移動    時(shí)間: 2025-3-28 11:49
Grammar of the Sentani Languagevely used for tracking is limited. By means of self-organization, the system structure is re-organized to activate filters adequate for the current context. The proposed framework is designed for, but not limited to, embedded computer vision. Experimental evaluations demonstrate the benefit of the approach.
作者: CURL    時(shí)間: 2025-3-28 15:36
Anthony Mihirana De Silva,Philip H. W. Leongenges that have to be tackled in order to provide an understanding of trust in OC-systems and gives perspectives on how this endeavour can be taken on. Current research initiatives in the area of trust in computing systems are reviewed and discussed.
作者: 皮薩    時(shí)間: 2025-3-28 22:27

作者: 毗鄰    時(shí)間: 2025-3-29 02:16

作者: 千篇一律    時(shí)間: 2025-3-29 05:41

作者: 紅腫    時(shí)間: 2025-3-29 08:08
Self-organizing Computer Vision for Robust Object Tracking in Smart Camerasvely used for tracking is limited. By means of self-organization, the system structure is re-organized to activate filters adequate for the current context. The proposed framework is designed for, but not limited to, embedded computer vision. Experimental evaluations demonstrate the benefit of the approach.
作者: 完全    時(shí)間: 2025-3-29 13:08

作者: fibroblast    時(shí)間: 2025-3-29 18:03
Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Serviceierarchical P2PSIP conferencing network is constructed by several regional overlay networks. Additionally, a hierarchical re-source-discovery mechanism was design in our paper. Finally, the system performance was simulated that can reduce resource-discovery time and total call-setup time for P2P conferencing services.
作者: 微粒    時(shí)間: 2025-3-29 23:39

作者: 革新    時(shí)間: 2025-3-30 01:08

作者: Institution    時(shí)間: 2025-3-30 04:42
Adaptive Control of Sensor Networksal changes locally at each node and applies changes to the protocol parameters by means of lightweight machine learning techniques. More complex exploration of possible parameters is transferred to powerful nodes, such as sink nodes. As an example we show how ONC can be applied to an exemplary WSN p
作者: 抒情短詩    時(shí)間: 2025-3-30 10:26

作者: 上下連貫    時(shí)間: 2025-3-30 13:51
Message Race Detection for Web Services by an SMT-Based Analysiso a set of SMT constraints. The satisfiability of these constraints means that message races will occur during the actual execution of the Web Service. Hence, we reduce the message race detection problem to constraint solving problem based on satisfiability modulo theories (SMT).
作者: Enteropathic    時(shí)間: 2025-3-30 19:50
A User-Oriented Approach to Assessing Web Service Trustworthinessrepository and search engine developed by our research team. Experimental results demonstrate that our approach has a significant advantage over other approaches that treat feedbacks equally and ignore the difference among user preferences.
作者: fertilizer    時(shí)間: 2025-3-30 22:28
Design and Analysis of “Flexible” ,-out-of-, Signatures no extra computation. The security of the proposed scheme is proved in the random oracle model based on the hardness of the discrete logarithm problem and the intractability of inverting cryptographic one-way hash functions.
作者: VOK    時(shí)間: 2025-3-31 01:02
Conference proceedings 2010ence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communicati
作者: 凈禮    時(shí)間: 2025-3-31 06:51

作者: BILIO    時(shí)間: 2025-3-31 12:10
https://doi.org/10.1057/9780230286856en each rater and the service client of the upcoming transaction. This process is termed as .. After trust normalization, normalized trust ratings are used for trust evaluation, the results of which would be closely bound to the upcoming transaction. Finally, we introduce the results of our conducte
作者: lambaste    時(shí)間: 2025-3-31 14:56
Analysis of Grammatical Evolution,o a set of SMT constraints. The satisfiability of these constraints means that message races will occur during the actual execution of the Web Service. Hence, we reduce the message race detection problem to constraint solving problem based on satisfiability modulo theories (SMT).
作者: 哎呦    時(shí)間: 2025-3-31 17:48

作者: LATHE    時(shí)間: 2025-4-1 00:08

作者: inferno    時(shí)間: 2025-4-1 02:18

作者: 克制    時(shí)間: 2025-4-1 06:32

作者: lattice    時(shí)間: 2025-4-1 12:17
Grammar of the Sentani Languages, and sophisticated human-machine-interfaces. These applications require small and efficient solutions which are commonly provided as embedded systems. This means that there exist resource constraints, but also the need for increasing adaptivity and robustness. This paper proposes an autonomic comp
作者: Aprope    時(shí)間: 2025-4-1 18:15





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
大名县| 湘阴县| 额尔古纳市| 鸡西市| 柯坪县| 平武县| 安福县| 墨竹工卡县| 桦川县| 银川市| 镇坪县| 太白县| 探索| 灵寿县| 乌拉特中旗| 汝州市| 澄江县| 苗栗县| 海安县| 错那县| 平江县| 榆树市| 南阳市| 民权县| 新民市| 长武县| 广灵县| 南华县| 昆山市| 久治县| 武宣县| 济宁市| 梅州市| 金川县| 根河市| 闸北区| 应城市| 钟祥市| 金溪县| 旺苍县| 和平县|