Sciweavers

131 search results - page 11 / 27
» Incorporating Trust in Network Virtualization
Sort
View
ESAS
2007
Springer
15 years 3 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
CCS
2011
ACM
13 years 9 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
LISA
2001
14 years 11 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
WWW
2008
ACM
15 years 10 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
ISNN
2011
Springer
14 years 19 days ago
Robust Multi-stream Keyword and Non-linguistic Vocalization Detection for Computationally Intelligent Virtual Agents
Abstract. Systems for keyword and non-linguistic vocalization detection in conversational agent applications need to be robust with respect to background noise and different speak...
Martin Wöllmer, Erik Marchi, Stefano Squartin...