نتایج جستجو برای: keywords trust

تعداد نتایج: 2024769  

Journal: :CoRR 2018
Payman Behnam

With ever advancing in digital system, security has been emerged as a major concern. Many researchers all around the world come up with solutions to address various challenges that are crucial for industry and market. The aim of this survey is a brief review of challenges of security validation as well as define and classify Hardware Trojans. Then, we provide more details about various validati...

Journal: :Vision Research 2006

Authors are requested to select key words from the following list. You may use plurals and adjectives for combinations like absolute pupillary response, centrifugal optic nerve, inter blobs, etc. If key words are needed which do not appear in this list, please underline them. For animal classification the Latin nomenclature should be used. p-mechanism A-scan a-wave aberration absolute absorptio...

2013
Robert J. Renka

Given a function f0 defined on the unit square Ω with values in R, we construct a piecewise linear function f on a triangulation of Ω such that f agrees with f0 on the boundary nodes, and the image of f has minimal surface area. The problem is formulated as that of minimizing a discretization of a least squares functional whose critical points are uniformly parameterized minimal surfaces. The n...

2016
Amel Ltifi

Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present...

Journal: :Applied Mathematics and Computation 2013
Parimah Kazemi Robert J. Renka

We describe a generalized Levenberg-Marquardt method for computing critical points of the Ginzburg-Landau energy functional which models superconductivity. The algorithm is a blend of a Newton iteration with a Sobolev gradient descent method, and is equivalent to a trust-region method in which the trustregion radius is defined by a Sobolev metric. Numerical test results demonstrate the method t...

Journal: :IJEBR 2017
Laila F. Anagreh Emad Abu-Shanab

Electronicgovernmentinitiativesplayacentralroleinopeningdoorsforpotentialvoterstoparticipate in the political process by using electronic voting systems.Electronic voting is attractingmore attentionbygovernmentsaroundtheworld,wheremanycountrieshaveexploitede-votingsystemsas analternativetotraditionalvotingintheirnationalelections.Citizensdiff...

2015
Issa Najafi

The E-Commerce, as to the nature of the transaction between both parties, is represented in various classifications and includes a framework of computer programs and systems that undertake services in the internet, which are search for information, exchange management, study of rating condition, provision of rating, online payment mode, summary of report and account management. These are the fo...

2012
Salima Hacini Zahia Guessoum Zizette Boufaïda

Human activities are increasingly based on the use of remote resources and services, and on the interaction between remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with various environmental security conditions. The aim of this paper is to propose a trust based mechanism to improve the security of mobile agents and all...

2006
Sangmi Lee Pallickara Beth Plale

Data-driven computational science on community computational resources is frequently of a magnitude and scale that it requires that computations be done remotely, generating resulting data collections that are too large to be shipped back to a user’s workstation. Service-oriented middleware is well equipped to carry out actions on behalf of a user, but SOA middleware does not address user trust...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید