Sciweavers

391 search results - page 1 / 79
» Attack-Resistance of Computational Trust Models
Sort
View
WETICE
2003
IEEE
13 years 10 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
DEBU
2008
165views more  DEBU 2008»
13 years 4 months ago
A Survey of Attack-Resistant Collaborative Filtering Algorithms
With the increasing popularity of recommender systems in commercial services, the quality of recommendations has increasingly become an important to study, much like the quality o...
Bhaskar Mehta, Thomas Hofmann
GLOBECOM
2010
IEEE
13 years 2 months ago
Attack-Resistant Collaboration in Wireless Video Streaming Social Networks
Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet. These users are motivated to collaborate with eac...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
IPPS
2007
IEEE
13 years 11 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
JCP
2006
102views more  JCP 2006»
13 years 4 months ago
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing
In this paper, we discuss a general methodology for analysis and modeling of trust relationships in distributed computing. We discuss the classification of trust relationships, cat...
Weiliang Zhao, Vijay Varadharajan, George Bryan