Sciweavers

947 search results - page 120 / 190
» HMM-Based Trust Model
Sort
View
111
Voted
JOC
2000
95views more  JOC 2000»
15 years 12 days ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
GIS
2009
ACM
15 years 7 months ago
An agenda for the next generation gazetteer: geographic information contribution and retrieval
Gazetteers are key components of georeferenced information systems, including applications such as Web-based mapping services. Existing gazetteers lack the capabilities to fully i...
Carsten Keßler, Krzysztof Janowicz, Mohamed ...
111
Voted
ATAL
2009
Springer
15 years 7 months ago
Adaptive learning in evolving task allocation networks
In this paper, we study multi-agent economic systems using a recent approach to economic modeling called Agent-based Computational Economics (ACE): the application of the Complex ...
Tomas Klos, Bart Nooteboom
107
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
INFOCOM
2005
IEEE
15 years 6 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...