Results 311 to 320 of about 150,216 (340)
Some of the next articles are maybe not open access.
Trusted Computing for Collaboration
2010The term “trusted computing” refers to a technology developed by the Trusted Computing Group. It mainly addresses two questions: “Which software is executed on a remote computer?” and “How can secret keys and other security sensitive data be stored and used safely on a computer?”. In this chapter the authors introduce the ideas of the trusted computing
Joerg Abendroth, Holger Kinkelin
openaire +1 more source
Molecular imaging in oncology: Current impact and future directions
Ca-A Cancer Journal for Clinicians, 2022Martin G Pomper, Steven P Rowe
exaly
2018
Relying on computer simulations and trusting their results is key for the epistemic future of this new research methodology. The questions that interest us in this chapter are how do researchers typically build reliability on computer simulations? and what exactly would it mean to trust results of computer simulations?
openaire +2 more sources
Relying on computer simulations and trusting their results is key for the epistemic future of this new research methodology. The questions that interest us in this chapter are how do researchers typically build reliability on computer simulations? and what exactly would it mean to trust results of computer simulations?
openaire +2 more sources
Emerging 2D Memory Devices for In‐Memory Computing
Advanced Materials, 2021Jun He, Ruiqing Cheng, Qisheng Wang
exaly
Trust as a Computational Concept
2013Trust is a frequently used concept in many disciplines. In social sciences, the emphasis is on understanding how trust impacts the way people make decisions. The computing literature concentrates on the design of tools that can assist people in various tasks.
openaire +2 more sources
2D Material Based Synaptic Devices for Neuromorphic Computing
Advanced Functional Materials, 2021Chao Zhu, Fucai Liu, Zheng Liu
exaly
Computing Recommendations to Trust
2004In a technology-intensive world humans are facing new problems stemming from the introduction of machine-intensive communication. The natural human ability to asses, accumulate and evaluate trust in other humans through direct interpersonal communications is significantly impaired when humans interact with systems alone. The development of applications
openaire +2 more sources
Dynamical memristors for higher-complexity neuromorphic computing
Nature Reviews Materials, 2022Suhas Kumar+2 more
exaly
1998
From a security perspective, the most relevant attribute of mobile computations is that they can cross security domain boundaries. This is important since security policies and mechanisms are often location-sensitive. When boundaries are crossed, trust relationships can change and hence trust decisions can no longer be made statically.
openaire +2 more sources
From a security perspective, the most relevant attribute of mobile computations is that they can cross security domain boundaries. This is important since security policies and mechanisms are often location-sensitive. When boundaries are crossed, trust relationships can change and hence trust decisions can no longer be made statically.
openaire +2 more sources