Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer theory
biblio
A graph-based trust-enhanced recommender system for service selection in IOT
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
IoT
Trusted Computing
trust
Temperature measurement
Social network services
Social Internet of Things
service selection problem
security of data
reliable service
recommender systems
pubcrawl
collaboration
Internet of Things
Human Factors
Human behavior
graph-based trust-enhanced recommender system
graph theory
control systems
computer theory
collaborative filtering recommendation algorithm
collaborative filtering
biblio
Decision-making in policy governed human-autonomous systems teams
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
machine reasoning processes
trust
social-exchange theory
social sciences computing
social exchange theory
pubcrawl
Protocols
policy governed human-autonomous system teams
multi-agent systems
military computing
Mathematical model
automated systems
learning (artificial intelligence)
Human Factors
Human behavior
decision-making
Decision Making
computer theory
collaboration
coalition environments
Biological system modeling
autonomous systems
biblio
The fuzzy control of trust establishment
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
model
unnecessary negotiation failure
Trusted Computing
trust establishment
trust
traditional ATN
strange entities
Servers
pubcrawl
process control
open network environment
negotiation strategy need
negotiation process
mutual trust
Access Control
Libraries
Human Factors
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy negotiation process
fuzzy control
Fuzzy
digital credentials
computer theory
Automated Trust Negotiation
authorisation
attribute certificate
biblio
Implicit Trust Relation Extraction Based on Hellinger Distance
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
social networking (online)
Measurement
optimization
probability statistics
pubcrawl
Recommended system
recommender systems
social network
Social network services
matrix factorization model
social recommendation
social trust relationship extraction
trust
trust measure methods
Trusted Computing
user similarity
user-item bipartite networks
Human behavior
clear trust data
computer theory
Data mining
explicit social trust information
explicit trust data
gaussian distribution
graph theory
hellinger distance
actual explicit user trust ratings
Human Factors
implicit social relation extractions
implicit social relationship
implicit social trust
implicit trust relation extraction
Matrix decomposition
matrix factorization
biblio
Trust aware node scheduling protocol for target coverage using rough set theory
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
target coverage
Protocols
pubcrawl
quality of service
resource scarcity
rough set theory
Rough sets
scheduling strategy
sensors
probability
target coverage problem
telecommunication scheduling
trust
trust aware node scheduling protocol
trust values
Wireless Sensor Network
wireless sensor networks
Human behavior
autonomous operation
computer theory
coverage maximization
coverage probability
decision rules
Energy Efficiency
energy efficient coverage protocol
fault tolerance
active nodes
Human Factors
lifetime
Monitoring
network efficiency
network lifetime
node states
optimisation
biblio
Towards Collaborative Trust Management
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
Peer-to-peer computing
Trusted Computing
trust profiles
trust management operations
Trust management
trust
taxonomy
Software Architecture
reference architecture
reconfigurable trust management operations
quality of service
pubcrawl
Personalized Trust
Cloud Computing
Human Factors
Human behavior
hardcoded trust computations
groupware
customizable trust management operations
contemporary trust management solutions
computer theory
computer architecture
Complexity theory
Collaborative Trust Computing
collaborative personalized trust management system
collaboration
biblio
Trustworthiness in Fog: A Fuzzy Approach
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
trustworthiness
computer theory
Fuzzy logic
Human behavior
Human Factors
Keywords - Fog computing
pubcrawl
trust
trust evaluation
biblio
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
game theory
trust
pubcrawl
Human behavior
smart contract
Human Factors
Collusion
verifiable computing
computer theory
biblio
Cobweb: Practical Remote Attestation Using Contextual Graphs
Submitted by K_Hooper on Wed, 02/14/2018 - 12:03pm
computer theory
trust
Human behavior
human trust
pubcrawl
Remote Attestation
TPMs
Trusted Computing
biblio
Provably-Secure Logic Locking: From Theory To Practice
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
computer theory
trust
boolean satisfiability (sat)
collaboration
composability
design-for-trust
hardware trojan
IP piracy
logic locking
Policy
policy-based governance
pubcrawl
Resiliency
reverse engineering
« first
‹ previous
1
2
3