Results 311 to 320 of about 150,216 (340)
Some of the next articles are maybe not open access.

Trusted Computing for Collaboration

2010
The term “trusted computing” refers to a technology developed by the Trusted Computing Group. It mainly addresses two questions: “Which software is executed on a remote computer?” and “How can secret keys and other security sensitive data be stored and used safely on a computer?”. In this chapter the authors introduce the ideas of the trusted computing
Joerg Abendroth, Holger Kinkelin
openaire   +1 more source

Molecular imaging in oncology: Current impact and future directions

Ca-A Cancer Journal for Clinicians, 2022
Martin G Pomper, Steven P Rowe
exaly  

Trusting Computer Simulations

2018
Relying on computer simulations and trusting their results is key for the epistemic future of this new research methodology. The questions that interest us in this chapter are how do researchers typically build reliability on computer simulations? and what exactly would it mean to trust results of computer simulations?
openaire   +2 more sources

Emerging 2D Memory Devices for In‐Memory Computing

Advanced Materials, 2021
Jun He, Ruiqing Cheng, Qisheng Wang
exaly  

Trust as a Computational Concept

2013
Trust is a frequently used concept in many disciplines. In social sciences, the emphasis is on understanding how trust impacts the way people make decisions. The computing literature concentrates on the design of tools that can assist people in various tasks.
openaire   +2 more sources

2D Material Based Synaptic Devices for Neuromorphic Computing

Advanced Functional Materials, 2021
Chao Zhu, Fucai Liu, Zheng Liu
exaly  

Computing Recommendations to Trust

2004
In a technology-intensive world humans are facing new problems stemming from the introduction of machine-intensive communication. The natural human ability to asses, accumulate and evaluate trust in other humans through direct interpersonal communications is significantly impaired when humans interact with systems alone. The development of applications
openaire   +2 more sources

Dynamical memristors for higher-complexity neuromorphic computing

Nature Reviews Materials, 2022
Suhas Kumar   +2 more
exaly  

Mobile Computations and Trust

1998
From a security perspective, the most relevant attribute of mobile computations is that they can cross security domain boundaries. This is important since security policies and mechanisms are often location-sensitive. When boundaries are crossed, trust relationships can change and hence trust decisions can no longer be made statically.
openaire   +2 more sources

Trusted Computing

2011
Stephen M. Papa, William D. Casper
openaire   +1 more source

Home - About - Disclaimer - Privacy