Sciweavers

947 search results - page 130 / 190
» HMM-Based Trust Model
Sort
View
83
Voted
WISE
2005
Springer
15 years 6 months ago
Peer-Sensitive ObjectRank - Valuing Contextual Information in Social Networks
Building on previous work on how to model contextual information for desktop search and how to implement semantically rich information exchange in social networks, we define a new...
Andrei Damian, Wolfgang Nejdl, Raluca Paiu
107
Voted
WORDS
2005
IEEE
15 years 6 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
117
Voted
CCS
2004
ACM
15 years 6 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
79
Voted
VLDB
2004
ACM
106views Database» more  VLDB 2004»
15 years 6 months ago
Vision Paper: Enabling Privacy for the Paranoids
P3P [23, 24] is a set of standards that allow corporations to declare their privacy policies. Hippocratic Databases [6] have been proposed to implement such policies within a corp...
Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hec...
93
Voted
ISSRE
2003
IEEE
15 years 5 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock