نتایج جستجو برای: kinds of trust
تعداد نتایج: 21170760 فیلتر نتایج به سال:
Typically paraconsistency is motivated by one of two types of arguments: either an ontological argument is given whereby it is claimed that inconsistent objects or events of some kind demand a logic able to reason about such items, or an epistemological argument is provided that denies that language or the world is infected with inconsistency but claims instead that the problem is all in a reas...
Utilitarian, Kantian and Aristotelian ethics are explained. They di er, but because they address di erent problems, it is possible to see each as contributing to an overall understanding of ethics as integrity.
Philosophers of science increasingly recognize the importance of idealization: the intentional introduction of distortion into scientific theories. Yet this recognition has not yielded consensus about the nature of idealization. e literature of the past thirty years contains disparate characterizations and justifications, but little evidence of convergence towards a common position. Despite th...
The wireless ad hoc network (WANET) is a type of wireless network in which some nodes are decentralized as well as self-organized in a wireless local area network. In recent years, insider threats increasingly damage the works not only in computer information systems, but also many wireless communications systems e.g. WANETs. We must take into consideration that the majority of insider threats ...
Due to the dynamism of topology, sharing of bandwidth and constraint of resources in wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc networks (MANETs) presents a great challenge. Security is another crucial aspect of providing QoS since the existence of malicious nodes present all kinds of threats to MANETs. Although a number of mechanisms have been propos...
Internet became today a medium of sharing large amount of data among different nodes situated anywhere in the world. Due to its fairly open nature Peer to Peer applications gain-ing popularity in sharing of large data rather then conventional client-server systems. Many P2P applications has been designed for the purpose of content distribution over Internet and most of them are based on decentr...
Provenance theorists and practitioners assume that provenance is essential for trust in and reuse of data. However, little empirical research has been conducted to more closely examine this assumption. This qualitative study explores how provenance affects end-users’ trust in and reuse of data. Toward this end, the authors conducted semistructured interviews with 17 proteomics researchers who i...
Peer-to-Peer (P2P) systems and applications are attracting a lot of attention nowadays, as they mimic human communities and support useful community. Due to their social and decentralized nature, trust plays an essential role for their functionality. P2P reputation systems have emerged in order to satisfy this need for trust. However, reputation systems themselves are targets of multiple kinds ...
Credentials are useful in many applications. For example, automated trust negotiation can be attained through the exchange of credentials. However, credentials endure all kinds of attacks during the transport while credentials bring us a lot of benefits. At the same time, how to store credentials is still a key problem to manage trust management systems. Good credential-storage design can great...
The current trend towards networked business forces enterprises to enter federated, loosely-coupled business networks, since much of the competition takes place between networks and value nets. The Pilarcos architecture provides solutions for B2B interoperability middleware to support various kinds of collaboration and cooperation networks by business service discovery and selection, interopera...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید