• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 2,432
Next 10 →

Table 1: Trust Management

in Reconstructing Trust Management
by Ajay Chander, Drew Dean, John C. Mitchell
"... In PAGE 6: ... An action is specified by how it changes the components of the world state w in which it is invoked. Table1 summarizes the effects of actions for the trust manage- ment model. The action Create(oc;o) denotes the creation of object o by the cre- ating object oc, and affects the components O;A; and D of the world state.... In PAGE 33: ... The latter method is more robust, and has the benefit of creating well- formed world states. Therefore, we created a separate theory to specify the effect of actions on the world state ( Table1 ), as well as an initial world state containing only a supervisor object. A reachable world state is one that can be reached only through an arbitrary sequence of actions, and it makes sense to apply evaluation functions only on such states.... ..."

Table 4. Trust Management

in A state-transition model of trust management and access control
by Ajay Chander 2001
Cited by 21

Table 2. Trust

in Calibrating trust to integrate intelligent agents into human teams
by P. Sycara, Michael Lewis 1998
"... In PAGE 5: ... Due to the high workload conditions ubjects who relied solely the standard menus would be unable to complete all their assigned tasks. Each agent provided one of three possible levels of t i information, corresponding to the three levels of trus dentified above ( Table2 ) [7] and their associated levels s h of information presentation. These information level elp the subject identify the TYPE of target and include 1 : ) aggregated information -- a list of parameters and e r values; performs simple transformations (climb/div ate , speed, signal strength ,and communication time);... ..."
Cited by 9

Table 1: Trust Management

in Deconstructing Trust Management
by Ajay Chander Stanford, Ajay Chander, Drew Dean, John C. Mitchell
Cited by 3

Table 1. Trust Lifecycle

in Security and Trust Issues in Semantic Grids
by Daniel Olmedilla, Omer F. Rana, Brian Matthews, Wolfgang Nejdl 2005
Cited by 1

Table 2: Trust Cache

in Ad Hoc Access Application Protocol (AHAAP)
by Pradip Lamsal Department

Table 4: Trust Comparison

in A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing
by Nadir Kiyanclar 2005

Table 1. Sources of Trust

in Ba & Pavlou/Trust Building Technology in Electronic Markets RESEARCH ARTICLE EVIDENCE OF THE EFFECT OF TRUST BUILDING TECHNOLOGY IN ELECTRONIC MARKETS: PRICE PREMIUMS AND BUYER BEHAVIOR 1
by Sulin Ba, Paul A. Pavlou

Table 1. Sources of Trust

in Ba & Pavlou/Trust Building Technology in Electronic Markets RESEARCH ARTICLE EVIDENCE OF THE EFFECT OF TRUST BUILDING TECHNOLOGY IN ELECTRONIC MARKETS: PRICE PREMIUMS AND BUYER BEHAVIOR 1
by Sulin Ba, Paul A. Pavlou

Table 2. Environmental factors

in Comparing Effort Estimates Based on Use Case Points with Expert Estimates
by Bente Anda 2002
"... In PAGE 4: ... 3. The use case points are adjusted based on the values assigned to a number of technical factors (Table 1) and environmental factors ( Table2 ). These factors are meant to account for effort that is not related to the size of the task.... In PAGE 4: ...6 + (.01*TFactor) The Environmental Factor (EF) is calculated accordingly by multiplying the value of each factor in Table2 by its weight and adding all the products to get the sum called the Efactor. The formula below is applied: EF = 1.... ..."
Cited by 2
Next 10 →
Results 11 - 20 of 2,432
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University