Sciweavers

236 search results - page 3 / 48
» Can You Trust Software Capability Evaluations
Sort
View
WINET
2010
147views more  WINET 2010»
13 years 4 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
CIKM
2010
Springer
13 years 4 months ago
You are where you tweet: a content-based approach to geo-locating twitter users
We propose and evaluate a probabilistic framework for estimating a Twitter user’s city-level location based purely on the content of the user’s tweets, even in the absence of ...
Zhiyuan Cheng, James Caverlee, Kyumin Lee
JCDL
2006
ACM
133views Education» more  JCDL 2006»
13 years 12 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
IJWIS
2007
153views more  IJWIS 2007»
13 years 5 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
ATAL
2011
Springer
12 years 6 months ago
Trust as dependence: a logical approach
We propose that the trust an agent places in another agent declaratively captures an architectural connector between the two agents. We formulate trust as a generic modality expre...
Munindar P. Singh