<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Trunk motion analysis in walking using gyro sensors
2
Trunk orientation estimate during walking using gyroscope sensors
3
Trunk reservation based control of circuit switched networks with dynamic routing
4
Trunk reservation for elastic optical networks
5
Trunk Reservation for Fair Utilization in Flexible Optical Networks
6
Trunk reservation with automatic alternative routing
7
Trunk stabilization by feedback sway control in FES-induced paraplegic standing
8
Trunk stabilization of multi-legged robots using on-line learning via a NARX neural network compensator
9
Trunk Waveguide Communication
10
Trunked land mobile radio in tactical applications
11
Trunked mobile radio: towards a pan-European digital standard
12
Trunked packet radio: future trends in digital mobile radio
13
Trunked private mobile radio-a lead from the electricity industry
14
Trunked radio systems: traffic prediction based on user clusters
15
Trunked simulcast system stimulator
16
Trunking a new system configuration for fleet dispatch communications
17
Trunking and traffic aspects of a sectionalised telephone exchange system
18
Trunking and traffic principles of a p.c.m. telephone exchange
19
Trunking aspects of multistage time-division switching network with time-slot-interchange capability
20
Trunking efficiency for multiple-carrier CDMA systems
21
Trunking efficiency in multi-carrier CDMA systems
22
Trunking facilities for a primary telephone switching point
23
Trunking of a t.d.m. electronic exchange with subscribers´ lines having permanently allocated multiplex channels
24
Trunking of multiplexed RF channels to remote antennas with fiber optic links
25
Trunking performance analysis of AAL2 for VBR voice transport
26
Trunking systems for p.c.m. exchanges
27
Trunking versus conventional radio systems
28
Trunking vs. conventional radio systems
29
Trunk-resource-efficiency-controlling soft handoff based on fuzzy logic and gradient descent method
30
TRUQ (TRansformation-Heat based up-quenching) for high-performance Nb
3
Al superconductors
31
TRUS image segmentation using morphological operators and DBSCAN clustering
32
Truss assembly and welding by Intelligent Precision Jigging Robots
33
Truss assembly by space robot and task error recovery via reinforcement learning
34
Truss sizing and shape optimization with stress and local buckling constraints
35
Truss spar platform motions for combined wave, current and wind forces
36
Truss Structure Analysis with Fuzzy Parameters Based on Structuring Element Method
37
Truss topology optimization with species conserving genetic algorithm
38
TRUSS: a reliable, scalable server architecture
39
TRUSS: Tracking Risk with Ubiquitous Smart Sensing
40
Truss-type deployable reflector antenna systems for synthetic aperture radar mounted on a small spacecraft
41
Trust
42
Trust 2.0: Who to believe in the flood of online data?
43
Trust analysis method of process behavior for data security exchange
44
Trust analysis of execution platform for self protected mobile code
45
Trust and Acceptance of Cloud Computing: A Revised UTAUT Model
46
Trust and Adaptation in STRATUS
47
Trust and authorization in the grid: a recommendation model
48
Trust and Autonomic Systems
49
Trust and Big Data: A Roadmap for Research
50
Trust and Business Webs
51
Trust and classification: towards community ontology revision and knowledge management
52
Trust and Cloud Services - An Interview Study
53
Trust and cluster based authentication schemes in mobile Ad Hoc networks — A review
54
Trust- and clustering-based authentication services in mobile ad hoc networks
55
Trust and Compactness in Social Network Groups
56
Trust and Control: A safety model for people and organisations
57
Trust and co-operation in system development: applying responsibility modelling to the problem of changing requirements
58
Trust and credibility on the web: The relationship of web experience levels and user judgments
59
Trust and deception in mediated communication
60
Trust and Decision Making: An Empirical Platform (CCP 204)
61
Trust and decision-making: An empirical platform (CCP 204)
62
Trust- and Distrust-Based Recommendations for Controversial Reviews
63
Trust and Electronic Commerce - A Test of an E-Bookstore
64
Trust and electronic commerce-more than a technical problem
65
Trust and energy aware Cluster modeling and spectrum handoff for cognitive radio ad-hoc network
66
Trust and exclusion in Vehicular Ad Hoc Networks: An economic incentive model based approach
67
Trust and forgiveness in virtual teams: A study in Algerian e-learning context
68
Trust and independence aware decision fusion in distributed networks
69
Trust and Its Challenges Facing E-Government Programs in Kenya
70
Trust and Knowledge Transfer between Business Partners: the Mediating Effects of Three Factors
71
Trust and Learning as Moderators in Achieving Supply-Chain Competitiveness: Evidence from the Chinese Auto Component Sectors
72
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks
73
Trust and monitoring in the workplace
74
Trust and norms for interaction
75
Trust and obfuscation principles for quality of information in emerging pervasive environments
76
Trust and persistence [software agents]
77
Trust and potential field-based routing protocol for wireless sensor networks
78
Trust and Privacy Exploitation in Online Social Networks
79
Trust and Privacy in Dissemination Control
80
Trust and privacy in electronic commerce
81
Trust and privacy in mobile experience sharing: future challenges and avenues for research
82
Trust and probability analysis in p2p network
83
Trust and Radio Frequency Identification (RFID) Adoption within an Alliance
84
Trust and Recommendations in Mobile Ad hoc Networks
85
Trust and reliability based load balancing algorithm for cloud IaaS
86
Trust and Reputation Algorithms for Unstructured P2P Networks
87
Trust and reputation approach to smart grid security
88
Trust and Reputation Aware Security for Resource Selection in Grid Computing
89
Trust and Reputation Based Collaborating Computing in Wireless Sensor Networks
90
Trust and Reputation Based Model Selection Mechanism for Decision-Making
91
Trust and reputation in dynamic scientific communities
92
Trust and Reputation in eLearning at the Workplace: The Role of Social Media
93
Trust and Reputation Management
94
Trust and reputation management in a small-world network
95
Trust and reputation model for R
2
-IBN framework
96
Trust and reputation model in peer-to-peer networks
97
Trust and reputation modeling of entry and exit in evolutionary Peer-to-Peer systems
98
Trust and reputation relationships in service-oriented environments
99
Trust and reputation scheme for clustering in Cognitive Radio Networks
100
Trust and respect: core values for good societies [The Presiden´ts Page]
101
Trust and Risk Assessment Approach for Access Control in Wireless Sensor Networks
102
Trust and Risk Evaluation of Transactions with Different Amounts in Peer-to-Peer E-commerce Environments
103
Trust and Risk in Collaborative Environments
104
Trust and risk in the e-environment
105
Trust and risk management towards resilient large-scale Cyber-Physical Systems
106
Trust and Risk-Based Access Control Model for Zero-Knowledge Oriented Mobile Peer-to-Peer Environments
107
Trust and role based access control for secure interoperation (“TracSI”)
108
Trust and security in dynamic systems
109
Trust and Security in Peer-to-Peer System
110
Trust and security in pervasive networking (pervasivetrust 2005)
111
Trust and Security in RFID-Based Product Authentication Systems
112
Trust and security research of the C2C e-commerce system based on third part payment platform
113
Trust and self-confidence based autonomy allocation for robotic systems
114
Trust and Share: Trusted Information Sharing in Online Social Networks
115
Trust and Situation Awareness in a 3-Player Diner´s Dilemma game
116
Trust and technology acceptance model: An experimental investigation concerning the idea contributor´s acceptance of the organizational matchmaking process
117
Trust and the Internet
118
Trust and Trustworthiness in Online Credit Markets
119
Trust and user profiling for refining the prediction of reader´s emotional state induced by news articles
120
Trust and vulnerability in open source software
121
Trust architecture for a personal distributed environment
122
Trust as Differentiator for Value-Adding Home Service Providers
123
Trust Assessment for Web Services Collaboration
124
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
125
Trust assessment in social participatory networks
126
Trust Assessment in Web Services: an Extension to jUDDI
127
Trust assessment in wireless ad-hoc networks
128
Trust Assessment Model Based on Domain Group Collaboration
129
Trust Assessment Using Provenance in Service Oriented Applications
130
Trust assistance in Sensor-Cloud
131
Trust Assurance in Cloud Services with the Cloud Broker Architecture for Dependability
132
Trust Aware Directed Diffusion Scheme for Wireless Sensor Networks
133
Trust aware particle filters for autonomous vehicles
134
Trust Aware Rouitng with Load Balancing in Ad Hoc Network Using Mobile Agent
135
Trust aware routing framework for OLSR protocol to enhance performance of Mobile Ad-Hoc Networks
136
Trust aware social context filtering using Shuffled frog leaping algorithm
137
Trust Aware System for P2P Routing Protocols
138
Trust aware systems in Wireless Sensor Networks
139
Trust Based Access Control for Grid Resources
140
Trust Based Access Control Framework for R-OSGi
141
Trust Based Access Control in Infrastructure-Centric Environment
142
Trust based access control scheme for pervasive computing environment
143
Trust based Ad-hoc on Demand Routing protocol for MANET
144
Trust Based Authorization and Access Control
145
Trust based certificate revocation of malicious nodes in MANET
146
Trust based channel preference in cognitive radio networks under collaborative selfish attacks
147
Trust based cluster and secure routing scheme for wireless sensor network
148
Trust based cluster head selection algorithm for wireless sensor network
149
Trust -Based Collaborative Filtering Algorithm
150
Trust based communication in unstructured P2P networks using reputation management and self certification mechanism
151
Trust based D2D communications for accessing services in Internet of Things
152
Trust based decision making approach for protein ontology
153
Trust based dynamic distributed IP addressing protocol for MANETs using fuzzy rule sets
154
Trust based energy efficient coverage preserving protocol for wireless sensor networks
155
Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET
156
TRUST based energy efficient routing in LEACH for wireless sensor network
157
Trust based Grid batch mode scheduling algorithms
158
Trust Based Grid Scheduling Algorithm for Commercial Grids
159
Trust based incentive in P2P network
160
Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures
161
Trust based interoperability security protocol for grid and Cloud computing
162
Trust based knowledge outsourcing for semantic Web agents
163
Trust Based Location Finding Mechanism in VANET Using DST
164
Trust Based Malicious Nodes Detection in MANET
165
Trust Based Multi Path DSR Protocol
166
Trust based optimal routing in MANET´s
167
Trust Based Privacy Preserving Access Control in Web Services Paradigm
168
Trust based QOS protocol(TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET
169
Trust Based Recommendation System in Service-oriented Cloud Computing
170
Trust Based Recommendation System with Social Network Analysis
171
Trust based recommendation systems
172
Trust based risk management for distributed system security - a new approach
173
Trust based Robust Position Estimation in wireless sensor networks
174
Trust Based Secure Localization in Wireless Sensor Networks
175
Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETs
176
Trust based secure routing in AODV routing protocol
177
Trust based secure routing protocol using fuzzy logic in wireless sensor networks
178
Trust based secure wireless communication in Ubiquitous network
179
Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network
180
Trust Based Secured Routing in Wireless Multimedia Sensor Networks
181
Trust Based Security Mechanisms for Social Networks
182
Trust Based Security Schemes in Mobile Ad Hoc Networks - A Review
183
Trust Based Sensor Network Clustering with Load Balance Factors
184
Trust Behavior Based Recommender System for Software Usage
185
Trust bootstrapping services and service providers
186
Trust building for SMEs in B2B e-Markets - a case study of the SEEMseed project
187
Trust building processes on web-based information-sharing platforms
188
Trust Build-Up in Online Transactions - Empirical Analysis of Taobao´s Trust Mechanism
189
Trust but verify
190
Trust but Verify Critical Infrastructure Cyber Security Solutions
191
Trust but verify: procedures to achieve accurate efficiency measurements for all photovoltaic technologies
192
Trust calculation in wireless sensor networks
193
Trust Calculation Model Based on Social Network and Evidence Theory
194
Trust Centrality in Online Social Networks
195
Trust challenges and issues of e-government: E-tax prospective
196
Trust Challenges in a High Performance Cloud Computing Project
197
Trust Cluster Head Election Algorithm Based on Ant Colony Systems
198
Trust Computation in VANETs
199
Trust Computation in Web Service Compositions Using Bayesian Networks
200
Trust computation through anomaly monitoring in distributed cognitive radio networks
201
Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
202
Trust Computing for Social Networking
203
Trust control in heterogeneous networks for Internet of Things
204
Trust Credential Distribution in Autonomic Networks
205
Trust Darknet: Control and Compromise in the Internet´s Certificate Authority Model
206
Trust Decision Making in Structured P2P Network
207
Trust Degree Based Access Control for social networks
208
Trust Degree Based Beamforming for MISO Cooperative Communication System
209
Trust Degree-Based Cooperative Transmission for Communication Secrecy
210
Trust delegation for medical records access using public mobile networks
211
Trust dependence network for recommender systems
212
Trust Derivation and Recommendation Management in a Trust Model
213
Trust Derivation and Transitivity in a Recommendation Trust Model
214
Trust dimensions in E-retailing: a strategic exploration
215
Trust Document Distribution in MANETs
216
Trust dynamics for collaborative global computing
217
Trust dynamics: how trust is influenced by direct experiences and by trust itself
218
Trust embedded grid system for the harmonization of practical requirements
219
Trust enabled Argumentation Based Recommender System
220
Trust Enabled Secure Multiparty Computation
221
Trust Engineering via Security Protocols
222
Trust Engines to Optimize Semi-Automated Industrial Production Planning
223
Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks
224
Trust Enhanced Cloud Security for Healthcare Services
225
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
226
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
227
Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents
228
Trust Enhanced Security Architecture for Detecting Insider Threats
229
Trust enhanced security for mobile agents
230
Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks
231
Trust establishment in cooperative wireless networks
232
Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems
233
Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems
234
Trust Establishment in Distributed Networks: Analysis and Modeling
235
Trust Establishment in Mobile Ad Hoc Networks
236
Trust establishment in the formation of Virtual Organizations
237
Trust establishment with data fusion for secure routing in MANETs
238
Trust Establishment: an enabler for dynamic Virtual Organizations
239
Trust estimation and fusion of uncertain information by exploiting consistency
240
Trust Estimation in autonomic networks: a statistical mechanics approach
241
Trust Estimation Method via Dependencies between Components
242
Trust Evaluation Based Content Filtering in Social Interactive Data
243
Trust Evaluation Based Reliable Routing in Wireless Mesh Network
244
Trust evaluation for buyer-supplier relationship concerning fuzzy approach
245
Trust evaluation for indirectly connected nodes using link community information
246
Trust Evaluation for P2P Systems
247
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
248
Trust evaluation in cloud based on friends and third party´s recommendations
249
Trust Evaluation in Composite Services Selection and Discovery
250
Trust evaluation in health information on the World Wide Web
251
Trust Evaluation in Mobile Devices: An Empirical Study
252
Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks
253
Trust evaluation method handling multi-factors for C2C E-Commerce
254
Trust Evaluation Model against Insider Attack in Wireless Sensor Networks
255
Trust Evaluation Model and Algorithm Based on Fuzzy Theory for E-commerce
256
Trust evaluation model based on cloud model for C2C electronic commerce
257
Trust Evaluation Model Based on Fuzzy Logic for C2C E-Commerce
258
Trust Evaluation Model Based on Optimal Search Theory
259
Trust Evaluation Model Based on Privacy Protection
260
Trust Evaluation Model for Composite Service Based on Subjective Logic
261
Trust evaluation model for fractal-based virtual enterprises using goal achievement probability
262
Trust evaluation model for wireless sensor networks
263
Trust Evaluation Model of E-Commerce Based on WOT
264
Trust evaluation model of partners in complex products and systems based on Rough Set theory and Support Vector Machine
265
Trust Evaluation Model with Stakeholder-Centric in Grids
266
Trust evaluation of CoPS partners based on wavelet support vector machine model and its application
267
Trust Evaluation Sensing for Wireless Sensor Networks
268
Trust evaluation using items ratings in online communities
269
Trust Evaluation via Large-Scale Complex Service-Oriented Online Social Networks
270
Trust evaluation within a type-2 fuzzy logic framework
271
Trust Evolution: Modeling and Its Applications
272
Trust extended object-oriented security model
273
Trust Factors in P2P Networks
274
Trust factors influencing the adoption of cloud-based interorganizational systems: A conceptual model
275
Trust for Location-Based Authorisation
276
Trust for ubiquitous, transparent collaboration
277
Trust for Vehicular Applications
278
Trust Formalization in Mobile Ad-Hoc Networks
279
Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks
280
Trust framework for calculating security strength of a cloud service
281
Trust framework for handling communication using social networks as applied to mobile sensor based indoor navigation system
282
Trust framework for P2P networks using peer-profile based anomaly technique
283
Trust game analysis between partners in the supply chain alliance
284
Trust game and strategy between the chinese family firm and professional manager
285
Trust in a cloud-based healthcare environment
286
Trust in a digital world — Examples of why we still test
287
Trust in adoption to judiciary informatics system of senior management users
288
Trust in and use of automation: their dependence on occurrence patterns of malfunctions
289
Trust in Automation
290
Trust in Business Processes
291
Trust in cloud computing
292
Trust in Cloud Services: Providing More Controls to Clients
293
Trust in Distributed Small Sized Data Centers
294
Trust in Distributed Teams: Support through Continuous Coordination
295
Trust in E-Government Transactional Services: A Study of Citizens´ Perceptions in Mexico and the U.S.
296
Trust in electronic commerce: definition and theoretical considerations
297
Trust in electronic environments
298
Trust in emergency evacuation robots
299
Trust in engineering teams and groups and virtual facilitation methods
300
Trust in Event Reporting Mechanisms for DRM
301
Trust in global computing systems as a limit property emerging from short range random interactions
302
Trust in Government Cross-Boundary Information Sharing Initiatives: Identifying the Determinants
303
Trust in ICT infrastructures for smart grids
304
Trust in International Electronic Commerce: A Study of Chinese Companies Engaged in International Trade
305
Trust in internet election observing the Norwegian decryption and counting ceremony
306
Trust in Knowledge Flow Networks
307
Trust in Leader and Multilevel Performance: Empirical Study Based on Knowledge Work Teams
308
Trust in M2M communication
309
Trust in Man/Machine Security Systems
310
Trust in mobile Ad Hoc Networks
311
Trust in Mobile Cloud Computing with LTE-based Deployment
312
Trust in Network Organizations -- A Literature Review on Emergent and Evolving Behavior in Network Organizations
313
Trust in online auction towards explaining the use intention
314
Trust in Online Shopping: The Korean Student Experience
315
Trust in PRIME
316
Trust in virtual healthcare communities: design and implementation of trust-enabling functionalities
317
Trust in virtual teams
318
Trust in virtual teams: towards an integrative model of trust formation
319
Trust in Web Services
320
Trust Incentive Model for Content Pre-fetch in Large Scale Video on Demand System
321
Trust Inference Computation for Online Social Networks
322
Trust Inference in Complex Trust-Oriented Social Networks
323
Trust Inference in Web-Based Social Networks Using Resistive Networks
324
Trust Inference Path Search with Minimum Uncertainty for E-Commerce
325
Trust infrastructure for policy based messaging in open environments
326
Trust infrastructures for future energy networks
327
Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks
328
Trust integrated link state routing protocol for Wireless Sensor Networks (TILSRP)
329
Trust integration in collaborative access control model for Critical Infrastructures
330
Trust Is in the Eye of the Beholder
331
Trust is much more than subjective probability: mental components and sources of trust
332
Trust issues and user reactions to e-services and e-marketplaces: a customer survey
333
Trust Issues for Vehicular Ad Hoc Networks
334
Trust Issues in Disaster Communications
335
Trust Issues in Service Oriented Environment
336
Trust Issues in Shibboleth-Enabled Federated Grid Authentication and Authorization Infrastructures Supporting Multiple Grid Middleware
337
Trust Issues that Create Threats for Cyber Attacks in Cloud Computing
338
Trust Judgment in Knowledge Provenance
339
Trust learning based on past experience
340
Trust Level and Routing Selection for Mobile Agents in a Smart Home
341
Trust Level Based Data Storage and Data Access Control in a Distributed Storage Environment
342
Trust level evaluation for communication paths in MANETs by using Attribute Certificates
343
Trust levels in Peer-to-Peer (P2P) vehicular communication
344
Trust levels in peer-to-peer (P2P) vehicular network
345
Trust literacy and education
346
Trust locating analysis in trust overlay network
347
Trust management and adversary detection for delay tolerant networks
348
Trust management and incentive mechanism for P2P networks: Survey to cope challenges
349
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services
350
Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid
351
Trust Management and Service Selection in Pervasive Computing Environments
352
Trust management and trust theory revision
353
Trust management approach for secure and privacy data access in cloud computing
354
Trust management approach to using various type of uncertain reasoning in network environment
355
Trust Management Based on Fuzzy Sets Theory for P2P Networks
356
Trust management for collusion prevention in mobile ad hoc networks
357
Trust Management for Defending On-Off Attacks
358
Trust management for distributed decision fusion in sensor networks
359
Trust Management for Encounter-Based Routing in Delay Tolerant Networks
360
Trust Management for IaaS with Group Signature
361
Trust management for mobile agent system based on trusted computing platforms
362
Trust Management for Semantec Web
363
Trust Management for Semantic Web
364
Trust management for service composition in SOA-based IoT systems
365
Trust management for the internet of things and its application to service composition
366
Trust Management for Ubiquitous Healthcare
367
Trust Management for User-Centric Identity Management on the Internet
368
Trust Management for Web Services
369
Trust management for Web Services
370
Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments
371
Trust management framework for social networks
372
Trust management in a distributed environment
373
Trust management in cloud computing: A survey
374
Trust management in cloud-integrated Wireless Sensor Networks
375
Trust management in collaborative agent-based systems
376
Trust management in cross domain operations
377
Trust management in Delay Tolerant Networks utilizing erasure coding
378
Trust Management in Distributed Systems
379
Trust Management in Distributed Systems via SPATE
380
Trust Management in Emergency Networks
381
Trust management in grid computing systems based on probability theory
382
Trust management in mobile ad hoc networks
383
Trust management in mobile ad hoc networks using a scalable maturity-based model
384
Trust Management in Opportunistic Networks
385
Trust Management in Opportunistic Networks: A Semantic Web Approach
386
Trust management in opportunistic pervasive healthcare systems
387
Trust Management in Peer-to-Peer SIP Using the Security Assertion Markup Language
388
Trust management in pervasive and service-oriented architectures
389
Trust management in privacy — Preserving information system
390
Trust Management in Swarm-Based Autonomic Computing Systems
391
Trust Management in the Pervasive Computing Era
392
Trust Management in Three Generations of Web-Based Social Networks
393
Trust Management in Wireless Mobile Networks with Cooperative Communications
394
Trust management mechanism for Internet of Things
395
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory
396
Trust Management Model in Distribute GIS
397
Trust Management Model of Cloud Computing Based on Multi-agent
398
Trust management model of cross-domain authorization
399
Trust Management of Encrypted Data Aggregation in a Sensor Network Environment
400
Trust Management of Health Care Information in Social Networks
401
Trust Management of Social Networks in Health Care
402
Trust management of XMPP federation
403
Trust Management Problem in Distributed Wireless Sensor Networks
404
Trust Management Scheme for Mobile Ad-Hoc Networks
405
Trust management system for grid and cloud resources
406
Trust management system for Opportunistic Cloud Services
407
Trust management techniques in Wireless Sensor Networks: An evaluation
408
Trust me, I´m a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems
409
Trust Me, I´m an Analyst
410
Trust Me, I´m an Expert: Trust, Homophily and Expertise in MMOs
411
Trust ME: A Trust Decision Framework for Mobile Environments
412
Trust Measurement Methods in Organic Computing Systems by Direct Observation
413
Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts
414
Trust Mechanism in Distributed Access Control Model of P2P Networks
415
Trust Mechanism in Grid Based on Grey System Theory
416
Trust Mechanisms for Efficiency Improvement in Collaborative Working Environments
417
Trust Mechanisms for Multi-owner Wireless Sensor Networks
418
Trust mechanisms: An integrated approach for E-commerce website development process
419
Trust meta-policies for flexible and dynamic policy based trust management
420
Trust metric integration in resource constrained networks via data fusion
421
Trust metrics
422
Trust Metrics Based on a Trusted Network Element
423
Trust metrics for survivable security systems
424
Trust metrics, models and protocols for electronic commerce transactions
425
Trust Model Based on Bayesian Network in E-commerce
426
Trust model based on dynamic policy similarity for pervasive computing environments
427
Trust Model Based on Rewards and Punishment Mechanism
428
Trust Model Based on TPM for Network Mobility
429
Trust Model Engines in Cloud Computing
430
Trust model for a cloud computing application and service
431
Trust model for consumer protection (TMCP)
432
Trust model for femto-cloud based mobile network
433
Trust Model for Open Resource Control Architecture
434
Trust model for open ubiquitous agent systems
435
Trust model for privacy in social networking using probabilistic determination
436
Trust model for private cloud
437
Trust model for semantic sensor and social networks: A preliminary report
438
Trust model for TRIDNT trust based routing Protocol
439
Trust Model for Virtual Organizations
440
Trust model for WSN
441
Trust Model of Educational Resource Grid based on fuzzy theory
442
Trust Model of Software Behaviors Based on Check Point Risk Evaluation
443
Trust Model of Users´ Behavior in Trustworthy Internet
444
Trust model regarding QoS using FCMs and D-S evidence theory
445
Trust model simulation for supply chain management
446
Trust model with delayed verification for message relay in VANETs
447
Trust model: Providing witness anonymity in P2P network
448
Trust modeling and evaluation in ad hoc networks
449
Trust modeling and verification using Colored Petri Nets
450
Trust Modeling for Networked Organizations Using Reputation and Collaboration Estimates
451
Trust modeling for peer-to-peer based computing systems
452
Trust modeling in multi-robot patrolling
453
Trust modeling in virtual communities using social network metrics
454
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
455
Trust Models Analysis for the Semantic Web
456
Trust Models and Security Considerations in Multicast Listener Discovery Protocol version 2 (MLDv2)
457
Trust models for sensor networks
458
Trust models in ICE-TEL
459
Trust Models in Wireless Sensor Networks and Online Social Networks: A Comparative Study
460
Trust Negotiation as an Authorization Service forWeb Services
461
Trust Negotiation Based Approach to Enforce MANET Routing Security
462
Trust negotiation for authentication and authorization in healthcare information systems
463
Trust Negotiation in Dynamic Coalitions
464
Trust Negotiation in Identity Management
465
Trust Negotiation with Trust Parameters
466
Trust negotiations for collaborative environments: Principles, concepts and systems
467
Trust Negotiations with Customizable Anonymity
468
Trust negotiations: concepts, systems, and languages
469
Trust Network Based Fuzzy Knowledge Sharing in Semantic Web
470
Trust Network Visualization Based on Force-Directed Layout
471
Trust networks in multi-robot communities
472
Trust networks: Interpersonal, sensor, and social
473
Trust Networks: Topology, Dynamics, and Measurements
474
Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation
475
Trust node valuation and path reliability technique for intrusion detection in MANET
476
Trust Observations in Validation Exercises
477
Trust of Hardware
478
Trust of User Using U-Key on Trusted Platform
479
Trust on a Nationwide Scale
480
Trust on E-Commerce Website in Thailand: A Case of Online Hotel Reservation
481
Trust Ontology Based on Access Control Parameters in Multi-organization Environments
482
Trust Ontology for Service-Oriented Environment
483
Trust opportunistic routing protocol in multi-hop wireless networks
484
Trust optimization in task-oriented social networks
485
Trust oriented resource allocation using bidding
486
Trust over Time and Distance in Global Partially Distributed Teams
487
Trust overlay networks for global reputation aggregation in P2P grid computing
488
Trust Path-Searching Algorithm Based on PSO
489
Trust performance of AODV, DSR and DSDV in wireless sensor networks
490
Trust prediction in multiplex networks
491
Trust prediction using Z-numbers and Artificial Neural Networks
492
Trust Propagation and Aggregation in Wireless Sensor Networks
493
Trust Propagation Model for Federated Virtual Commnunities
494
Trust Propagation Model in Pervasive Computing Environment
495
Trust Propagation Policy for Secure Interoperability in Multi-domain Environments
496
Trust propagation—cardinality-based approach
497
Trust Put to the Test: A Testcase for a Cognitive Trust Model
498
Trust Realisation in Multi-domain Collaborative Environments
499
Trust region algorithm for image reconstruction in electrical capacitance tomography system
500
Trust Region Method for Solving the Bioluminescence Tomography Inverse Problem
501
Trust Region Methods for the Estimation of a Complex Exponential Decay Model in MRI With a Single-Shot or Multi-Shot Trajectory
502
Trust region nonlinear optimization learning method for dynamic synapse neural networks
503
Trust Region Secant/Finite Difference Method for Large Sparse Minimax Problems
504
Trust Region-Based Optimization for Maximum Mutual Information Estimation of HMMs in Speech Recognition
505
Trust Relationship Establishment Based on the Existing Trust
506
Trust Relationship Modelling in E-commerce-Based Social Network
507
Trust Relationships and Reputation Relationships for Service Oriented Environments
508
Trust relationships in inter-organizational learning alliance — using the bicycle industry’s A-Team as example
509
Trust relationships in secure mobile systems
510
Trust relationships in secure systems-a distributed authentication perspective
511
Trust Representation and Reasoning for Access Control in Large Scale Distributed Systems
512
Trust requirements and performance of a fast subtransport-level protocol for secure communication
513
Trust Requirements in Identity Federation Topologies
514
Trust research to address uncertainty in security for the smart grid
515
Trust revision for conflicting sources
516
Trust Risk of Enterprise Knowledge Sharing within Collaborative Commerce
517
Trust routing protocol based on congestion control in MANET
518
Trust Routing Protocol Framework Based on Behavior Assessment for Wireless Sensor Networks
519
Trust security mechanism for marine Wireless Sensor Networks
520
Trust sensor interface for improving reliability of EMG-based user intent recognition
521
Trust Service Discovery by Opinions Classification on Virtual Communities
522
Trust Service Selection in Pervasive Computing
523
Trust services: a framework for service-based solutions
524
Trust Similarity Measure in Trust Model for P2P Networks
525
Trust Study of E-Commerce in China Based on B2C Model
526
Trust support for SDN controllers and virtualized network applications
527
Trust System Design Optimization in Smart Grid Network Infrastructure
528
Trust Ticket Deployment: A Notion of a Data Owner´s Trust in Cloud Computing
529
Trust Trade-off Analysis for Security Requirements Engineering
530
Trust Transference from Brick to Click Retailers: A Conceptual Model for Impersonal Trust
531
Trust Transference in Mobile Banking: An Investigation of the Initial Trust
532
Trust Type Based Semantic Web Services Assessment and Selection
533
Trust type based trust bootstrapping model of computer network collaborative defense
534
Trust value assignment using model-based testing
535
Trust value calculation in domains based on grid environment
536
Trust vector-based sensitive information protecting scheme in automatic trust negotiation
537
Trust vs. threats: recovery and survival in electronic commerce
538
Trust with Social Network Learning in E-Commerce
539
Trust Your Model - Verifying Aerospace System Models with Java Pathfinder
540
TRUST!-A distributed multi-agent system for community formation and information recommendation
541
Trust-𝒳;: a peer-to-peer framework for trust establishment
542
Trust, as a main barrier in adoption to B2C E-Commerce
543
Trust, but Verify
544
Trust, but verify [Electronics Standards]
545
Trust, But Verify: Fast and Accurate Signal Recovery From 1-Bit Compressive Measurements
546
Trust, confidence and e-commerce in cyberspace
547
Trust, Dependence and Global Interorganizational Systems
548
Trust, Guanxi and Supplier Search in China: A Conceptual Guide for the Supplier
549
Trust, opinion diffusion and radicalization in social networks
550
Trust, security, privacy, and risk in industrial informatics
551
Trust, self-confidence and supervisory control in a process control simulation
552
Trust, systems and accidents: designing complex systems
553
Trust, the "wisdom of crowds", and societal norms: the creation, maintenance, and reasoning about trust in peer networks
554
Trust, trait theory, and collaboration in telemedicine: a circumplex perspective
555
Trust, trait theory, and collaboration in telemedicine: an empirical test
556
TRUST: A General Framework for Truthful Double Spectrum Auctions
557
TRUST: A Trigger-Based Automatic Subjective Weighting Method for Network Selection
558
Trust: essential to effective assessment
559
Trust: Transaction History Based Peer-to-Peer Trust Model
560
Trust
CV
: Reputation-based trust for collectivist digital business ecosystems
561
Trust
2
: developing trust in peer-to-peer environments
562
Trustability based on beta distribution detecting abnormal behaviour nodes in WSN
563
Trustable Ad Hoc Networks of Agent Societies
564
Trustable autonomous systems using adaptive control
565
Trustable computing in next-generation avionic architectures
566
Trustable outsourcing of business processes to cloud computing environments
567
Trustable web services with dynamic confidence time interval
568
Trust-adapted enforcement of security policies in distributed component-structured applications
569
Trust-assisted anomaly detection and localization in wireless sensor networks
570
Trust-Assisted Handover Decision Algorithm in Hybrid Wireless Networks
571
Trust-aware access control: How recent is your transaction history?
572
Trust-aware Adaptive P2P Overlay Topology Based on Superpeer-partition
573
Trust-Aware Component Service Selection Algorithm in Service Composition
574
Trust-aware cooperation
575
Trust-aware crowdsourcing with domain knowledge
576
Trust-Aware Elastic Social Compute Units
577
Trust-aware federated IdM in consumer cloud computing
578
Trust-Aware In-Network Aggregation for Wireless Sensor Networks
579
Trust-Aware Media Quality Profiles in Fake Multimedia Detection
580
Trust-aware monitoring scheme for WiMAX networks
581
Trust-aware optimal crowdsourcing with budget constraint
582
Trust-aware privacy evaluation in online social networks
583
Trust-Aware Query Processing in Data Intensive Sensor Networks
584
Trust-aware resource allocation in a cognitive radio system
585
Trust-Aware Review Spam Detection
586
Trust-Aware Service Recommendation via Exploiting Social Networks
587
Trust-Based Access Control for Collaborative System
588
Trust-Based Access Control for Privacy Protection in Collaborative Environment
589
Trust-based access control for XML databases
590
Trust-Based Adaptation in Complex Service-Oriented Systems
591
Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-Hop Wireless Networks
592
Trust-Based and QoS Demand Clustering Analysis Customizable Cloud Workflow Scheduling Strategies
593
Trust-based anomaly detection in wireless sensor networks
594
Trust-based anonymity framework for Wireless Mesh Networks
595
Trust-Based Anonymous Communication for malicious user disclosure in Mobile Ad Hoc Networks
596
Trust-Based Ant Colony Optimization for Grid Resource Scheduling
597
Trust-based Ant Recommender (T-BAR)
598
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey
599
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
600
Trust-based authorization model on interval-valued fuzzy sets theory
601
Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks
602
Trust-Based Collaboration Service Framework: A Platform for Communication and Content Sharing
603
Trust-based Collaborative Filtering
604
Trust-Based Community Formation in Peer-to-Peer File Sharing Networks
605
Trust-Based Content Distribution for Mobile Ad Hoc Networks
606
Trust-Based Context Contract Models for the Internet of Things
607
Trust-based controller for convoy string stability
608
Trust-Based Cooperative Action Control in Multi-agent Systems for Network Management
609
Trust-Based Countermeasures for Securing OLSR Protocol
610
Trust-Based Data Disclosure in Sensor Networks
611
Trust-based data fusion mechanism design in cognitive radio networks
612
Trust-based decentralized service discovery in structured Peer-to-Peer networks
613
Trust-Based Decision Making in Dynamic Environments
614
Trust-based decision-making for the adaptation of public displays in changing social contexts
615
Trust-based delegation for Ad Hoc QoS enhancing
616
Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments
617
Trust-based Dynamic Access Control Model for P2P Network
618
Trust-based dynamic access control policy for ubiquitous computing
619
Trust-based Dynamic Web service Composition using Social Network Analysis
620
Trust-Based Energy Efficient Spectrum Sensing in Cognitive Radio Networks
621
Trust-Based Fast Authentication for Mobile IPv6 Networks
622
Trust-Based Fast Authentication for Multiowner Wireless Networks
623
Trust-Based Fast Inter-Domain Secure Handoff over Heterogeneous Wireless Networks
624
Trust-Based Formal Delegation Framework for Enterprise Social Networks
625
Trust-based framework for security enhancement of P2PSIP communication systems
626
Trust-based Framework for Security Enhancement of Wireless Sensor Networks
627
Trust-based fusion of classifiers for static code analysis
628
Trust-based geographical routing For smart grid communication networks
629
Trust-based grouping for cloud datacenters: Improving security in shared infrastructures
630
Trust-based improved recommendation of IT-related Web resources
631
Trust-Based Information and Decision Fusion for Military Convoy Operations
632
Trust-Based Intrusion Detection in Wireless Sensor Networks
633
Trust-Based LEACH Protocol for Wireless Sensor Networks
634
Trust-based mechanism design
635
Trust-based multi-agent filtering for increased Smart Grid security
636
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks
637
Trust-based on-demand multipath routing in mobile ad hoc networks
638
Trust-Based Optimal Workplace Coalition Generation
639
Trust-based optimized routing scheme in Mobile Social Networks
640
Trust-based performance measurement using fuzzy operators
641
Trust-based privacy preservation for peer-to-peer data sharing
642
Trust-based QoS routing algorithm for Wireless Sensor Networks
643
Trust-based rating prediction for recommendation in Web 2.0 collaborative learning social software
644
Trust-based recommendation for the social Web
645
Trust-Based Recommender System in P2P Network
646
Trust-Based Requirements Traceability
647
Trust-based resource allocation and evaluation of workflows in distributed computing environments
648
Trust-based Resource Allocation in Web Services
649
Trust-Based Robust Mechanism in Peer-to-peer Computing
650
Trust-based routing for ad-hoc wireless networks
651
Trust-based routing for Kademlia in a sybil scenario
652
Trust-based RPL for the Internet of Things
653
Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment
654
Trust-based secure cloud data storage with cryptographic role-based access control
655
Trust-Based Security for Community-Based Cognitive Radio Networks
656
Trust-Based Security for the Spanning Tree Protocol
657
Trust-based security in pervasive computing environments
658
Trust-based Security Protocol against blackhole attacks in opportunistic networks
659
Trust-based self-organising network control
660
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives
661
Trust-Based Service Composition and Optimization
662
Trust-based social item recommendation: A case study
663
Trust-based SPIT detection by using call duration and social reliability
664
Trust-based storage in a Kademlia network infected by Sybils
665
Trust-based supernode selection in peer-to-peer systems
666
Trust-based Sybil nodes detection with robust seed selection and graph pruning on SNS
667
Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks
668
Trust-based taxonomy for free riders in distributed multimedia systems
669
Trust-Based User-Role Assignment in Role-Based Access Control
670
Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships
671
TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks
672
TrustBox: A Security Architecture for Preventing Data Breaches
673
TrustBuilder: negotiating trust in dynamic coalitions
674
Trust-by-Wire in Packet-Switched IPv6 Networks: Tools and FPGA Prototype for the IPclip System
675
Trust-by-Wire in packet-switched networks: Calling line identification presentation for IP
676
TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing
677
TrustCell: towards the end-to-end trustworthiness in data-oriented scientific computing
678
TrustChord: Chord protocol based on the trust management mechanism
679
TrustCloud: A Framework for Accountability and Trust in Cloud Computing
680
TrustCom 2008 Organizing and Program Committees
681
TrustCom 2009 Organizing and Program Committees - Volume 2
682
TrustCom 2010 Organizing and Program Committees
683
TrustCom 2011 Organizing and Program Committees
684
TrustCom 2011 Reviewers
685
TrustCom 2011 Welcome Message from the Conference Chairs
686
TrustCom 2011 Welcome Message from the Program Chairs
687
TrustCom 2013: Message from the General Chairs
688
TrustCom 2013: Message from the Program Chairs
689
TrustCom 2013: Message from the Steering Chairs
690
TrustCom 2013: Message from the Workshop/Symposium Chairs
691
TrustCom 2013: Organizing and Program Committees
692
TrustCom 2014 Organizing and Program Committees
693
TrustCom 2015 and RATSP 2015 Program Committee
694
TrustCom 2015 External Reviewers
695
TrustCom 2015 Organizing Committee
696
TrustCom Organizing and Program Committees
697
Trust-Contexts Modeling, Organization and Trust Estimation on the Web
698
trustd: Trust daemon experimental testbed for network emulation
699
TrustDavis: a non-exploitable online reputation system
700
Trust-driven both-matched algorithm for grid task multi-objective scheduling
701
Trust-driven information acquisition for secure and quality decision-making
702
Trust-driven interactive visual navigation for autonomous robots
703
Trust-Driven Policy Enforcement through Gate Automata
704
Trust-E: A Trusted Embedded Operating System Based on the ARM Trustzone
705
TrustED 2012 External Reviewers
706
TrustED 2012 Program Committee
707
Trusted Access Control Model Based on Role and Task in Cloud Computing
708
Trusted access in wireless network on mutual interactive authentication mechanism
709
Trusted Access to Sensitive Information in a Diverse Services Environment
710
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems
711
Trusted and secured routing in MANET: An improved approach
712
Trusted anonymizer-based RFID system with integrity verification
713
Trusted Anonymous Execution: A Model to Raise Trust in Cloud
714
Trusted Application-Centric Ad-Hoc Networks
715
Trusted architecture for farmland wireless sensor networks
716
Trusted Architecture for Mobile P2P Systems
717
Trusted Assessment of Web Services Based on a Six-Dimensional QoS Model
718
Trusted autonomy
719
Trusted Behavior Based Spam Filtering
720
Trusted Block as a Service: Towards Sensitive Applications on the Cloud
721
Trusted Boot and Platform Trust Services on 1CD Linux
722
Trusted business system model using context sensitiveness
723
Trusted BWI: Privacy and trust enhanced biometric web identities
724
Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing
725
Trusted Channels with Password-Based Authentication and TPM-Based Attestation
726
Trusted checkpointing based on ant colony optimization in MANET
727
Trusted Cloud Computing with Secure Resources and Data Coloring
728
Trusted coalition scenario database
729
Trusted Code Remote Execution through Trusted Computing and Virtualization
730
Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
731
Trusted collaborative spectrum sensing for mobile cognitive radio networks
732
Trusted Communication System Based on RSA Authentication
733
Trusted components - 2nd Workshop on Trusted Components
734
Trusted computation with an adversarial cloud
735
Trusted Computer Systems
736
Trusted computing - A new challenge for embedded systems
737
Trusted computing - opportunities & risks
738
Trusted Computing and Gene Identification Used in 3G Mobile E-Business System
739
Trusted computing and information security
740
Trusted computing based microkernel
741
Trusted Computing Based Mobile DRM Authentication Scheme
742
Trusted Computing Based on Virtualization
743
Trusted Computing based open environment user authentication model
744
Trusted Computing Dynamic Attestation by Using Static Analysis Based Behavior Model
745
Trusted Computing Enabled Access Control for Virtual Organizations
746
Trusted Computing Enabled System for Wireless Networks
747
Trusted Computing enhanced OpenID
748
Trusted Computing for Disk Drives and Other Peripherals
749
Trusted computing for protecting ad-hoc routing
750
Trusted Computing in Context
751
Trusted computing method research of integration reputation with context in e-commerce
752
Trusted Computing Platform in Your Pocket
753
Trusted Computing Systems: The ProCoS* Experience
754
Trusted computing technology analyzing in NGSCB
755
Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?
756
Trusted Computing: An Elusive Goal
757
Trusted Computing: Integrating Trust and Security into Computer Platforms
758
Trusted computing: providing security for peer-to-peer networks
759
Trusted Computing-Based Double Factor Authentication for Mobile Terminals
760
Trusted Computing-Based Security Architecture For 4G Mobile Networks
761
Trusted Connection between Mobile Nodes and Mobility Anchor Points in Hierarchical Mobile IPv6
762
Trusted connection system based on virtual machine architecture
763
Trusted cooperative spectrum sensing scheme based on D-S evidence theory
764
Trusted CVS
765
Trusted data in IBM´s MDM: Accuracy dimension
766
Trusted Data Sharing over Untrusted Cloud Storage Providers
767
Trusted Design in FPGAs
768
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements
769
Trusted Digital Rights Management in Peer-to-Peer Communities
770
Trusted distributed log services
771
Trusted Distributed Repository of Internet Usage Data for Use in Cyber Security Research
772
Trusted distribution of software over the Internet
773
Trusted Dynamic Scheduling for Large-Scale Parallel Distributed Systems
774
Trusted Dynamic Source Routing Protocol
775
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries
776
Trusted Evolutionary Algorithm
777
Trusted Evolutionary Algorithm for Global Optimization
778
Trusted Exam Marks System at IUG using XML-signature
779
Trusted Execution Environment: What It is, and What It is Not
780
Trusted Execution Environments: A Look under the Hood
781
Trusted Fault Tolerant Model of MANET with Data Recovery
782
Trusted foundry: the path to advanced SiGe technology
783
Trusted Framework for Health Information Exchange
784
Trusted full disk encryption model based on TPM
785
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds
786
Trusted Gossip:A Rumor Resistant Dissemination Mechanism for Peer-to-Peer Information Sharing
787
Trusted Greedy Perimeter Stateless Routing
788
Trusted grid model
789
Trusted Group Key Management for Real-Time Critical Infrastructure Protection
790
Trusted group membership service for JXME (JXTA4J2ME)
791
Trusted Hardware: Can It Be Trustworthy?
792
Trusted High-Performance Computing in the Classroom
793
Trusted host-based card emulation
794
Trusted Identities in Cyberspace
795
Trusted identity attribute service method with privacy protection in cyberspace
796
Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems
797
TRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing Base
798
Trusted Integrated Circuit Strategy
799
Trusted integration of cloud-based NFC transaction players
800
Trusted Interaction Patterns in Large-scale Enterprise Service Networks
801
Trusted Internet forensics: design of a network forensics appliance
802
Trusted learner: An improved algorithm for trusted incremental function approximation
803
Trusted Location Based Services
804
Trusted Logging for Grid Computing
805
Trusted Management for Mobile Computing Entities Enabled by Fuzzy Logic Approach
806
Trusted measurement model of runtime process behavior based on turing
807
Trusted military services based on the secure domain of the mobile security solution
808
Trusted Mobile Interaction via Extended Digital Certificates
809
Trusted module based secure electronic transaction scheme
810
Trusted neighborhood discovery in critical infrastructures
811
Trusted Network Access Control in the Eduroam Federation
812
Trusted network coding framework
813
Trusted Network Coding in Wireless Ad Hoc Networks
814
Trusted Network Connection Based on Object Fingerprints
815
Trusted network connection of Inter-Domian on Xen virtual machine
816
Trusted network for Aerial Vehicles
817
Trusted objects
818
Trusted ontology-based telemedicine systems and real-time discoveries
819
Trusted P2P computing environments with role-based access control
820
Trusted P2P Group Interaction
821
Trusted P2P Media Delivery to Mobile Devices
822
Trusted P2P transactions with fuzzy reputation aggregation
823
Trusted partner identification method through trust values for e-business (B2B) supply chain integrator- A qualitative analysis using Sequential Explanatory Strategy
824
Trusted Platform Based Linux File Access Control
825
Trusted platform for support services in cloud computing environment
826
Trusted Platform Module as an Enabler for Security in Cloud Computing
827
Trusted Platform Module for Smart Cards
828
Trusted Platforms to Secure Mobile Cloud Computing
829
Trusted Privacy Manager: A System for Privacy Enforcement
830
Trusted query in spatial and temporal correlated wireless sensor networks
831
Trusted Real Time Operating System: Identifying its characteristics
832
Trusted remote attestation scheme based on property
833
Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis
834
Trusted route discovery with TORA protocol
835
Trusted Routing for Resource-Constrained Wireless Sensor Networks
836
Trusted routing for VANET
837
Trusted routing in ad-hoc networks using pheromone trails
838
Trusted RTL: Trojan detection methodology in pre-silicon designs
839
Trusted RUBIX architecture and policy model interpretation
840
Trusted Sampling-Based Result Verification on Mass Data Processing
841
Trusted secure electronic voting machine
842
Trusted sensors and remote sensing
843
Trusted service access with dynamic security infrastructure configuration
844
Trusted Service Application Framework on Mobile Network
845
Trusted Service Discovery through Identity Management
846
Trusted Services for Risk Management in Work Environments
847
Trusted Software Architectural Modeling Method
848
Trusted Software Verification: A Case Study
849
Trusted software´s holy grail
850
Trusted Spanning Tree for Delay Tolerant MANETs
851
Trusted spanning trees for Delay Tolerant Mobile Ad Hoc Networks
852
Trusted Storage over Untrusted Networks
853
Trusted system construction
854
Trusted Tamper-Evident Data Provenance
855
Trusted Terminal Design of Distributed Environment
856
Trusted third party based mutual authentication in UPT system
857
Trusted time distribution service for the romanian time stamping authorities
858
Trusted transactions in a mobile environment
859
Trusted Transmission Protocol for Content Security
860
Trusted transport mode based cluster-merkle-tree for wireless sensor networks
861
Trusted user authentication scheme combining password with fingerprint for mobile devices
862
Trusted verification test bench development for Phase-Locked Loop (PLL) hardware insertion
863
Trusted Vertical Handoff Algorithms in Mutihop-Enabled Heterogeneous Wireless Networks
864
Trusted Virtual Infrastructure Bootstrapping for On Demand Services
865
Trusted virtual machine monitor-based group signature architecture
866
Trusted Virtual Private Datacenter: A Model toward Secure IaaS Cloud
867
Trusted watermarks
868
TrustEd: A Dual-Database Trusted Broker for Multi-agency Data
869
Trusted3Ballot: Improving Security and Usability of Three Ballot Voting System Using Trusted Computing
870
TrustedBox: a kernel-level integrity checker
871
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
872
Trusted-HB: A Low-Cost Version of HB
Secure Against Man-in-the-Middle Attacks
873
TrustedSIM: Towards Unified Mobile Security
874
Trust-Enabled Link Spoofing Detection in MANET
875
Trust-enhanced alteration scenario for universal computer
876
Trust-Enhanced Component Service Selection Algorithm in Service Composition
877
Trust-enhanced data integrity model
878
Trust-enhanced intelligent security model
879
Trust-enhanced message security protocol for mobile ad hoc networks
880
Trust-Enhanced Multicast Routing Protocol Based on Node´s Behavior Assessment for MANETs
881
Trust-enhanced recommender system based on case-based reasoning and collaborative filtering
882
TRUSTER: Trusted social behavior inspired scheme for cooperative spectrum sensing
883
TrustEYE.M4: Protecting the sensor — Not the camera
884
TrustForge: Flexible access control for collaborative crowd-sourced environment
885
TrustFraMM: Meta Description for Trust Frameworks
886
Trustful Data Forwarding in Social Opportunistic Networks
887
Trustful Location Based Energy Deterioration on Demand Multipath Routing in Mobile Ad Hoc Networks
888
TrustGeM: Dynamic trusted environment generation for chip-multiprocessors
889
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems
890
Trust-group-based authentication services for mobile ad hoc networks
891
Trust-GSM: A Trust Aware Security Model for Multi-domain Grid
892
TrustGuard: A flow-level reputation-based DDoS defense system
893
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices
894
TrustID 2011 Organizing and Program Committees
895
TrustID 2013: Message from the Symposium Chairs
896
TrustID 2013: Organizing and Program Committees
897
TrustID Organizing and Program Committees
898
TRUSTIE: Design of a Trustworthy Software Production Environment
899
Trusting a Chaotic Future
900
Trusting a library: A study of the latency to adopt the latest Maven release
901
Trusting agents for grid computing
902
Trusting ambitious predictions
903
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
904
Trusting cloud computing for personal files
905
Trusting mobile user devices and security modules
906
Trusting norms in normative multi-agent systems
907
Trusting Open Source Information
908
Trusting routers and relays in ad hoc networks
909
Trusting Skype: Learning the Way People Chat for Fast User Recognition and Verification
910
Trusting smartphone Apps? To install or not to install, that is the question
911
Trusting Software Tools in a Secure DRM Architecture
912
Trusting the Cloud: A PROV + RBAC Approach
913
Trusting the Data: ComEd´s Journey to Embrace Analytics
914
Trusting the same: Using similarity to establish trust among vehicles
915
Trusting the teacher in the grey-flannel suit
916
Trusting User Defined Context in MANETs: Experience from the MIDAS Approach
917
Trusting your assistant
918
Trust-Involved Access Control in Collaborative Open Social Networks
919
TrustLP: A trust-based localization protocol for wireless sensor networks
920
TrustMe: anonymous management of trust relationships in decentralized P2P systems
921
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
922
TrustMR: Computation integrity assurance system for MapReduce
923
Trustnet Architecture for E-mail Communication
924
Trust-networks for changing driver behaviour during severe weather
925
Trust-oriented Access Control based on Sources of Information Flow
926
Trust-Oriented Multi-visualization of Cooperation Context
927
Trust-Oriented Research Methods in Cloud Environment
928
Trust-preserving set operations
929
Trust-privacy tradeoffs in distributed systems
930
Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks
931
Trust-QoS Based Semantic Web Service Discovery Technology
932
Trust-QoS Based Semantic Web Service Discovery Technology
933
Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis
934
Trustrace: Mining Software Repositories to Improve the Accuracy of Requirement Traceability Links
935
Trust-region algorithm based local search for multi-objective optimization
936
Trust-region Filter Method with 3-piecewise Linear NCP Function
937
Trust-region learning for ICA
938
Trust-region methods for real-time tracking
939
Trust-region reflective adaptive controller for time varying systems
940
Trust-region-based convergence safeguards for space mapping design optimization of microwave circuits
941
TrustRRM: An Improved Reputation Management Scheme Handling Dishonest Feedback in Peer-to-Peer Networks
942
TrustSets - Using Trust to Detect Deceitful Agents in a Distributed Information Collecting System
943
TrustSoft 2015 Organizing and Program Committees
944
TrustStore: Making Amazon S3 Trustworthy with Services Composition
945
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
946
TRUST-TECH Based Neural Network Training
947
Trust-tech based parameter estimation and its application to power system load modeling
948
TRUST-TECH-Based Expectation Maximization for Learning Finite Mixture Models
949
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone
950
TrustVisor: Efficient TCB Reduction and Attestation
951
TrustVP: Construction and Evolution of Trusted Chain on Virtualization Computing Platform
952
Trustworthily Forwarding Sensor Networks Information to the Internet
953
Trustworthiness among Peer Processes in Distributed Agreement Protocol
954
Trustworthiness and Confidence of Peers in Peer-to-Peer (P2P) Network
955
Trustworthiness and Quality of Context Information
956
Trustworthiness Assessment of Knowledge on the Semantic Sensor Web by Provenance Integration
957
Trustworthiness Assessment of Wireless Sensor Data for Business Applications
958
Trustworthiness Benchmarking of Web Applications Using Static Code Analysis
959
Trustworthiness Calculation Based on Delegation Relationship in E-service
960
Trustworthiness Evaluation and Testing of Open Source Components
961
Trustworthiness Evaluation of Registered Information in a Trusted E-Commerce Data Service
962
Trustworthiness Expectation of Real-Time Web Services
963
Trustworthiness framework of reusable test case
964
Trustworthiness Fusion of Web Service Based on D-S Evidence Theory
965
Trustworthiness in buyer-supplier relation on supply chain collaboration among SMEs
966
Trustworthiness in crowd- sensed and sourced georeferenced data
967
Trustworthiness in distributed electronic healthcare records - basis for shared care
968
Trustworthiness in peer-to-peer overlay networks
969
Trustworthiness in Peer-to-Peer Systems
970
Trustworthiness in Pervasive and Ubiquitous Environment
971
Trustworthiness in Software Environments
972
Trustworthiness in wireless sensor and actuator networks: towards low-complexity reliability and security
973
Trustworthiness Management in the Social Internet of Things
974
Trustworthiness measurement methodology (TMM) for assessment purposes
975
Trustworthiness Measurement Methodology (TMM) for Assessment Purposes
976
Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis
977
Trustworthiness monitoring and prediction of composite services
978
Trustworthiness of Acquaintance peers on Access Control Models
979
Trustworthiness of Acquaintances in Peer-to-Peer(P2P) Overlay Networks
980
Trustworthiness of collaborative Open Source Software quality assessment
981
Trustworthiness of Medical Devices and Body Area Networks
982
Trustworthiness of open information systems: how should it be achieved?
983
Trustworthiness of Open Source, Open Data, Open Systems and Open Standards
984
Trustworthiness of Peers Based on Access Control in Peer-to-Peer Overlay Networks
985
Trustworthiness of Peers in P2P Overlay Networks
986
Trustworthiness of random network coded information in untrustworthy networks
987
Trustworthiness QoS Driven Service Selection in the Context of Environment
988
Trustworthiness Tendency Incremental Extraction Using Information Gain
989
Trustworthiness: safety, security and privacy issues
990
Trustworthiness_Metrics Model for Internetware
991
Trustworthiness-based Approach to Reliably Make Agreement among Peers in Scalable P2P Group
992
Trustworthiness-Based Broadcast Algorithm in Scalable P2P Group
993
Trustworthiness-Based Broadcast Protocols in Wireless Networks
994
Trustworthiness-based controllable delegation trust management model in P2P
995
Trustworthiness-based Group Communication Protocols
996
Trustworthiness-Based Group Communication Protocols
997
Trustworthiness-Based Group Making Approach in Scalable P2P Group
998
Trustworthy access control with untrustworthy Web servers
999
Trustworthy agents for B2B operations under Normative environment
1000
Trustworthy and Communal Social Classifieds Using HTTP and Wi-Fi