Sciweavers

947 search results - page 87 / 190
» HMM-Based Trust Model
Sort
View
95
Voted
IMCSIT
2010
14 years 10 months ago
Trusted Data in IBM's MDM: Accuracy Dimension
A good data model designed for e-Commerce or e-Government has little value if it lacks accurate, up-to-date data [22]. In this paper data quality measures, its processing and maint...
Przemyslaw Pawluk
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 6 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
97
Voted
WINE
2009
Springer
151views Economy» more  WINE 2009»
15 years 5 months ago
Consistent Continuous Trust-Based Recommendation Systems
Abstract. The goal of a trust-based recommendation system is to generate personalized recommendations from known opinions and trust relationships. Prior work introduced the axiomat...
Ola Rozenfeld, Moshe Tennenholtz
ACSAC
2004
IEEE
15 years 4 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
JASIS
2006
108views more  JASIS 2006»
15 years 21 days ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...