Results 1 - 10
of
26,734
TABLE VI ASPECTS OF TRUST IN ASSESSMENT AS CHARACTERIZED IN LOW- AND HIGH-TRUST ENVIRONMENTS
Table 3. Axioms on Trust and Distrust
2005
"... In PAGE 12: ... Notice that ST1-2 and ST5 have also to be repeated for the case where the dependum is a task. Table3 de nes the intensional versions, entrust exec and disentrust exec (entrust perm and disentrust perm) of the extensional predicates trust exec and distrust exec (trust perm and distrust perm) that are used to build (dis)trust chains by propagating (dis)trust of execution (permission) relations. The in- tuitive meaning of rules T1-2 (and T5-6 for permission) is presented in the following examples.... ..."
Cited by 14
Table 3. Axioms on Trust and Distrust
2005
"... In PAGE 12: ... Notice that ST1-2 and ST5 have also to be repeated for the case where the dependum is a task. Table3 de nes the intensional versions, entrust exec and disentrust exec (entrust perm and disentrust perm) of the extensional predicates trust exec and distrust exec (trust perm and distrust perm) that are used to build (dis)trust chains by propagating (dis)trust of execution (permission) relations. The in- tuitive meaning of rules T1-2 (and T5-6 for permission) is presented in the following examples.... ..."
Cited by 14
Table 3: Axioms on Trust and Distrust
in Abstract
2005
"... In PAGE 12: ... Notice that ST1-2 and ST5 have also to be repeated for the case where the dependum is a task. Table3 de nes the intensional versions, entrust exec and disentrust exec (entrust perm and disentrust perm) of the extensional predicates trust exec and distrust exec (trust perm and distrust perm) that are used to build (dis)trust chains by propagating (dis)trust of execution (permission) relations. The intuitive meaning of rules T1-2 (and T5-6 for permission) is presented in the following examples.... ..."
Table 4: Compilation and execution environment
Table 2. Simulation Environment
2004
"... In PAGE 6: ... It is designed using a discrete event simula- tion capability provided by Parsec. Table2 summarizes our simulation environment. In order to allow devices employing pessimistic trust approaches, where a trust in other devices can only decrease, we randomly assigned every device to have an initial high trust above a39 for 3 to 5 other devices in the environment.... ..."
Cited by 2
Table 3: Properties of the desktop and web execution environments
2006
"... In PAGE 80: ... The properties of them considered in this work are transient state and concurrency management in general. Table3 shows detailed properties we use to difierentiate between them.... In PAGE 80: ...Table 3: Properties of the desktop and web execution environments As shown in Table3 , system instantiation is done once for all requests a user can place to the system in the desktop environment, whereas it difiers among technologies and options within a technology in the web environment. The desktop environment is stateful, whereas the web environment is inherently stateless by default through using stateless HTTP protocol.... ..."
Table 2. Execution times for the Cornell box environment.
"... In PAGE 10: ... The two cubes are red and blue and have rough specular surfaces. Table2 summarizes the execution times for each stage in the processing of this environment and for computing a 30-frame walkthrough. For this animation, we used a quality q of .... ..."
Table 2. Execution times for the Cornell box environment.
"... In PAGE 10: ... The two cubes are red and blue and have rough specular surfaces. Table2 summarizes the execution times for each stage in the processing of this environment and for computing a 30-frame walkthrough. For this animation, we used a quality q of .... ..."
Table 1 Java Execution Environment Comparison
"... In PAGE 7: ... We compared the perfor- mance/footprint trade-off of this system against that of a variety of JVMs and Java-to- native compiler-based solutions using the EmbeddedCaffeineMark benchmark. Table1 illustrates that a fixed offloading of runtime support can offer a good perfor- mance/footprint trade-off compared to a traditional Java execution environment, and a similar trade-off to that of a monolithic Java-to-native compiler. The results for the jPure and monolithic Java-to-native compiler show similar performance/footprint trade-offs because they are derived from the same source, but the absolute perfor- mance score for jPure is lower because of the cost for remote access of runtime sup- port functions on the server.... ..."
Results 1 - 10
of
26,734