Sciweavers

1117 search results - page 118 / 224
» A Compliance Model of Trust
Sort
View
CIDM
2007
IEEE
15 years 8 months ago
Application of Neural Networks for Data Modeling of Power Systems with Time Varying Nonlinear Loads
— Nowadays power distribution systems typically operate with nonsinusoidal voltages and currents. Harmonic currents from nonlinear loads propagate through the system and cause ha...
Joy Mazumdar, Ganesh K. Venayagamoorthy, Ronald G....
JTAER
2007
90views more  JTAER 2007»
15 years 1 months ago
One-size e-business adoption model does not fit all
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption i...
Barbara Roberts, Mark Toleman
COMPSAC
2003
IEEE
15 years 7 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
CCS
2011
ACM
14 years 1 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 4 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...