Sciweavers

989 search results - page 85 / 198
» An information-based model for trust
Sort
View
WWW
2010
ACM
15 years 6 months ago
SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement
We consider the problem of deep web source selection and argue that existing source selection methods are inadequate as they are based on local similarity assessment. Specificall...
Raju Balakrishnan, Subbarao Kambhampati
69
Voted
CCS
2009
ACM
15 years 5 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
DALT
2009
Springer
15 years 5 months ago
Declarative and Numerical Analysis of Edge Creation Process in Trust-Based Social Networks
Online social networks are enjoying drastic increase in their population and connectivity. One of the fundamental issues in these networks is trust, which is an essential factor in...
Babak Khosravifar, Jamal Bentahar, Maziar Gomrokch...
ICCS
2009
Springer
15 years 5 months ago
Experience with Approximations in the Trust-Region Parallel Direct Search Algorithm
Recent years have seen growth in the number of algorithms designed to solve challenging simulation-based nonlinear optimization problems. One such algorithm is the Trust-Region Par...
S. M. Shontz, V. E. Howle, P. D. Hough
72
Voted
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
15 years 5 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...