Sciweavers

271 search results - page 3 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
EUROPAR
2010
Springer
13 years 6 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
TRUST
2010
Springer
13 years 3 months ago
The Role of Soft Information in Trust Building: Evidence from Online Social Lending
We analyze empirical data of Germany’s largest online social lending platform Smava.de to exemplarily study the contribution of unstructured, ambiguous, or unverified informatio...
Stefanie Pötzsch, Rainer Böhme
IOR
2008
103views more  IOR 2008»
13 years 5 months ago
Portfolio Credit Risk with Extremal Dependence: Asymptotic Analysis and Efficient Simulation
We consider the risk of a portfolio comprised of loans, bonds, and financial instruments that are subject to possible default. In particular, we are interested in performance meas...
Achal Bassamboo, Sandeep Juneja, Assaf J. Zeevi
PERVASIVE
2006
Springer
13 years 5 months ago
Risks of Using AP Locations Discovered Through War Driving
Many pervasive-computing applications depend on knowledge of user location. Because most current location-sensing techniques work only either indoors or outdoors, researchers have ...
Minkyong Kim, Jeffrey J. Fielding, David Kotz
WINET
2010
147views more  WINET 2010»
13 years 3 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis