Sciweavers

947 search results - page 92 / 190
» HMM-Based Trust Model
Sort
View
ICN
2005
Springer
15 years 10 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
152
Voted
WWW
2011
ACM
15 years 7 days ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han
166
Voted
JAMIA
2010
131views more  JAMIA 2010»
15 years 3 days ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
149
Voted
WWW
2010
ACM
16 years 9 days ago
SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement
We consider the problem of deep web source selection and argue that existing source selection methods are inadequate as they are based on local similarity assessment. Specificall...
Raju Balakrishnan, Subbarao Kambhampati
113
Voted
CCS
2009
ACM
16 years 3 days ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino