نتایج جستجو برای: assurances

تعداد نتایج: 797  

2017
Iakovos Gurulian Konstantinos Markantonakis Carlton Shepherd Eibe Frank Raja Naeem Akram

Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance of devices involved in a transaction beyond their operating environment. In the field of smart cards, distance bounding protocols have been proposed in order to counter relay attacks. For smartphones, meanwhile, the natural ambient environment surrounding the devices has been proposed as a potential Pro...

1998
Jaroslaw J. Sydir Saurav Chatterjee Bikash Sabata

Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the IEEE. Abstract * In this paper we describe the implementation of our end-to-en...

2015
Shi-Ming Huang Wei-Cheng Shen David C. Yen Ling-Yi Chou

2002
Marc Bekoff Kirk Johnson Bridget Cummings Nancy Mathews Lekelia D. Jenkins Susan Haig

Though the mountain lion (Puma concolor) has been considered extirpated in Michigan since the early 1900s, sightings of the big cats have persisted in both the Upper and Lower Peninsulas. Reports of mountain lions increased during the 1990s, and the Michigan Department of Natural Resources (DNR) does acknowledge the existence of this species within the state. However, State officials continue t...

Journal: :IEEE Transactions on Parallel and Distributed Systems 2021

Machine Learning as a Service (MLaaS) allows clients with limited resources to outsource their expensive ML tasks powerful servers. Despite the huge benefits, current MLaaS solutions still lack strong assurances on: 1) service correctness (i.e., whether works expected); 2) trustworthy accounting bill for resource consumption is correctly accounted); 3) fair payment client gets entire result bef...

2002
Kathryn M. Kimery Mary McCord

Consumer trust of Internet vendors is a major factor influencing the success of e-commerce. To enhance consumer trust, many e-retailers are experimenting with various trust-building strategies, including participation in third-party assurance programs. This study presents a model describing the relationship between trust and online purchasing, as well as related relationships with antecedents t...

Journal: :IEICE Transactions 2005
Chaiwat Oottamakorn Dennis Bushmitch

Among recent trends in Quality of Service (QoS) provisioning in the Internet is the Differentiated Services Architecture, termed DiffServ. The successful deployment of Diffserv to provide a premium QoS guarantees to network traffic requires an effective admission control mechanism, which needs to be scalable and relatively simple to implement. In this paper we present a QoS network framework wi...

2002
Jerome A. Rolia Xiaoyun Zhu Martin F. Arlitt Artur Andrzejak

Utility grid environments o er programmatic access to information technology (IT) resources for applications. There is a substantial literature regarding admission control, resource reservation, and scheduling in support of engineering and scienti c jobs for grids. Typically each job is associated with a duration and peak requirements for resources. In this paper we focus on techniques to suppo...

2012
Kyoungho An Subhav Pradhan Faruk Caglar Prithviraj Patil Shashank Shekhar Aniruddha Gokhale

Contemporary cloud computing solutions that have proven beneficial in supporting the needs of enterprise applications do not readily carry over to supporting cyber physical system workflows. For example, existing cloud platforms do not yet provide the stringent assurances on multiple simultaneous quality of service (QoS) properties expected by CPS applications including timeliness, reliability ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید