• Aucun résultat trouvé

[PDF] Top 20 A modal approach to model computational trust

Has 10000 "A modal approach to model computational trust" found on our website. Below are the top 20 most common "A modal approach to model computational trust".

A modal approach to model computational trust

A modal approach to model computational trust

... of a global survey on computational trust that presents differ- ent perspective on how to model trust, by presenting the modelization process as composed of three ...general ... Voir le document complet

140

A coherent computational Approach to model the bottom-up visual attention.

A coherent computational Approach to model the bottom-up visual attention.

... recent computational models of visual attention can be placed in two ...categories. A recent trend concerns a statistical signal-based approach [2] which consists of automatically predicting ... Voir le document complet

17

A multi-modal approach using a non-parametric model to extract fetal ECG

A multi-modal approach using a non-parametric model to extract fetal ECG

... is a multi-channel method as the classical methods like adaptive filters; however despite adaptive filters this is a non-linear ...provides a multi- modal approach to use the PCG ... Voir le document complet

6

A model order reduction approach to create patient-specific mechanical models of human liver in computational medicine applications.

A model order reduction approach to create patient-specific mechanical models of human liver in computational medicine applications.

... from a limited number of ...modes to represent the ...and a more difficult convergence. Here it is difficult to go further than 10 shape modes for the SSL without reaching high ... Voir le document complet

13

A model order reduction approach to create patient-specific mechanical models of human liver in computational medicine applications.

A model order reduction approach to create patient-specific mechanical models of human liver in computational medicine applications.

... from a limited number of ...modes to represent the ...and a more difficult convergence. Here it is difficult to go further than 10 shape modes for the SSL without reaching high ... Voir le document complet

13

A non‐biased trust model for wireless mesh networks

A non‐biased trust model for wireless mesh networks

... the trust threshold boundary of 0.5. The aggregated trust value is ...due to the choice of the weighting factors in the linear function which we configure as ...using a heavier weight on the ... Voir le document complet

38

A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration

A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration

... at a single ...disseminated. To overcome this limitation, some recent approaches envisioned replacing the single authority centralization of services by a peer- to-peer trust-based ... Voir le document complet

17

A Trust-based Decision-making Approach Applied to Agents in Collaborative Environments

A Trust-based Decision-making Approach Applied to Agents in Collaborative Environments

... propose a com- putational model of social trust. In this model the trustor’s beliefs about the trustee’s motivation, capac- ity and opportunity to do a task, are used to ... Voir le document complet

9

Uncertainty in biology: a computational modeling approach

Uncertainty in biology: a computational modeling approach

... with a myriad of influencing factors, which strongly complicates the model building and validation ...wants to address four main issues related to the building and validation of ... Voir le document complet

1

Design for assembly : a computational approach to construct interlocking wooden frames

Design for assembly : a computational approach to construct interlocking wooden frames

... Given a three dimensional digital model of an interlocking frame, the feasibility of the disassembly sequence can be assessed by analyzing the geometric contact constraints b[r] ... Voir le document complet

96

T2D: A Peer to Peer trust management system based on Disposition to Trust

T2D: A Peer to Peer trust management system based on Disposition to Trust

... the trust paradigm is essential to broadly extend the communication between the environment’s actors, the eval- uation of trust becomes a challenge when confronted with initializing the ... Voir le document complet

8

Algebraic approach to modal extensions of Łukasiewicz logics

Algebraic approach to modal extensions of Łukasiewicz logics

... as a way to give a concrete interpretation of Šukasiewicz nitely-valued calculi and their associated algebras (see ...Up to now, mathematician have modeled the game in a simple way by ... Voir le document complet

119

A computational approach for obstruction-free photography

A computational approach for obstruction-free photography

... formation model. A camera is imaging a scene through a visual obstruction, which can be either a reflective object, such as glass, or an opaque object, such as a ...order ... Voir le document complet

12

A generic approach to model generation operations

A generic approach to model generation operations

... The approach is functional but suffers from computational is- ...combinatorial approach seems generally more fitted for syn- chronization than classical transformations or ...Finally a number ... Voir le document complet

20

Trust Approach Based on User's Activities

Trust Approach Based on User's Activities

... allows to underline and discover chains of access and control relations between the actors and the digital resources in a ...system. A user may completely trust a person in a ... Voir le document complet

7

Multimodal Approach for Emotion Recognition Using a Formal Computational Model

Multimodal Approach for Emotion Recognition Using a Formal Computational Model

... dimensional approach Representing emotional states in technological environments is necessarily based on some representation ...proposed a model of emotional states based on the Bayesian networks, ... Voir le document complet

11

A Computational Model of Trust Based on Message Content and Source

A Computational Model of Trust Based on Message Content and Source

... extent to which new information is accepted by an agent directly depends on the content of the new claim and on how much the agent trusts the source providing ...However, trust may also be influenced by ... Voir le document complet

3

A MODAL APPROACH TO THE NUMERICAL SIMULATION OF A STRING VIBRATING AGAINST AN OBSTACLE: APPLICATIONS TO SOUND SYNTHESIS

A MODAL APPROACH TO THE NUMERICAL SIMULATION OF A STRING VIBRATING AGAINST AN OBSTACLE: APPLICATIONS TO SOUND SYNTHESIS

... present a conservative numerical scheme to model a stiff damped string vibrating against an arbitrarily shaped ...follows. A modal expansion is used as a starting point ... Voir le document complet

9

A Certified Trust Region Reduced Basis Approach to PDE-Constrained Optimization

A Certified Trust Region Reduced Basis Approach to PDE-Constrained Optimization

... is a projection-based model re- duction method for parametrized PDEs ...novel a pos- teriori error estimation procedures for the elliptic and parabolic PDE-constrained parameter optimization problems ... Voir le document complet

28

Graph-Based Trust Model for Evaluating Trust Using Subjective Logic

Graph-Based Trust Model for Evaluating Trust Using Subjective Logic

... as a UML class diagram. Figure 3 presents a graphical representation of a simple system drawn by apply- ing S OCIO P ATH ...that a person John wants to achieve the activity “accessing ... Voir le document complet

51

Show all 10000 documents...