Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,369,728 papers from all fields of science
Search
Sign In
Create Free Account
CyberTrust
Known as:
Baltimore Cybertrust
, UniCERT
CyberTrust was a security services company formed in Virginia in November 2004 from the merger of TruSecure and Betrusted. Cybertrust acquired a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Authentication
Information security
Non-repudiation
Point to Point Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Stock Market Volatility Prediction: A Service-Oriented Multi-kernel Learning Approach
Feng Wang
,
Ling Liu
,
Chenxiao Dou
IEEE Ninth International Conference on Services…
2012
Corpus ID: 5959294
Stock market is an important and active part of nowadays financial markets. Stock time series volatility analysis is regarded as…
Expand
2011
2011
Applying game theory to analyze attacks and defenses in virtual coordinate systems
Sheila Becker
,
Jeff Seibert
,
David Zage
,
C. Nita-Rotaru
,
R. State
Dependable Systems and Networks
2011
Corpus ID: 1041100
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to…
Expand
2010
2010
Energy-Aware Loop Parallelism Maximization for Multi-core DSP Architectures
Meikang Qiu
,
J. Niu
,
L. Yang
,
X. Qin
,
Senlin Zhang
,
Bin Wang
IEEE/ACM Int'l Conference on Green Computing and…
2010
Corpus ID: 16114499
With the advance of semiconductor, multi-core architecture is inevitable in today's embedded system design. Nested loops are…
Expand
2010
2010
Surface modification of silica particles and upconverting particles using click chemistry
H. Mader
2010
Corpus ID: 91397849
Upconverting nanoparticles (UCNPs) of the NaYF4 type with narrow size distribution from 60 to 90 nm, were prepared using the…
Expand
2009
2009
DHT-Based Range Query Processing for Web Service Discovery
Yiming Zhang
,
Ling Liu
,
Dongsheng Li
,
Feng Liu
,
Xicheng Lu
IEEE International Conference on Web Services
2009
Corpus ID: 15772260
DHTs are scalable, self-organizing, and adaptive to underlying topology changes, thus being a promising infrastructure for…
Expand
2008
2008
A Flexible Trust Model for Distributed Service Infrastructures
Zhaoyu Liu
,
S. Yau
,
Dichao Peng
,
Yin Yin
IEEE International Symposium on Real-Time…
2008
Corpus ID: 10103728
Recent years have witnessed the emergence and rapid growth of distributed service infrastructures such as mobile ad hoc networks…
Expand
2008
2008
Role Based Access Control and OWL
Timothy W. Finin
,
A. Joshi
,
+4 authors
B. Thuraisingham
OWL: Experiences and Directions
2008
Corpus ID: 429552
Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting…
Expand
2008
2008
Scalable processing of spatial alarms
Bhuvan Bamba
,
Ling Liu
,
Philip S. Yu
,
Gong Zhang
,
Myungcheol Doo
International Conference on High Performance…
2008
Corpus ID: 16166616
Spatial alarms can be modeled as location-based triggerswhich are fired whenever the subscriber enters the spatial region…
Expand
2007
2007
A Methodology of Engineering Ontology Development for Information Retrieval
Zhanjun Li
,
Raskin Victor
,
Ramani Karthik
2007
Corpus ID: 16951417
When engineering content is created and applied during the product lifecycle, it is often stored and forgotten. Since search…
Expand
2006
2006
Camera Response Function Estimation from a Single-channel Image Using Differential Invariants
T. Ng
,
Shih-Fu Chang
,
Mao-Pei Tsui
2006
Corpus ID: 18795320
The camera response function (CRF) models the important characteristics of cameras and digital images. Recent work in [1…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE