Sciweavers

72 search results - page 2 / 15
» Trust network analysis with subjective logic
Sort
View
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
13 years 11 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
IFIPTM
2009
171views Management» more  IFIPTM 2009»
13 years 3 months ago
Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration
Trust has been explored by many researchers in the past as a solution for assisting the process of recommendation production. In this work we are examining the feasibility of build...
Georgios Pitsilis
WWW
2004
ACM
14 years 6 months ago
Propagation of trust and distrust
A (directed) network of people connected by ratings or trust scores, and a model for propagating those trust scores, is a fundamental building block in many of today's most s...
Ramanathan V. Guha, Ravi Kumar, Prabhakar Raghavan...
JDCTA
2010
150views more  JDCTA 2010»
13 years 6 days ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
ATAL
2008
Springer
13 years 7 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...