Sciweavers

130 search results - page 21 / 26
» Learning to Trust
Sort
View
IAT
2005
IEEE
15 years 3 months ago
Exploiting Multi-Agent Interactions for Identifying the Best-Payoff Information Source
In many different applications on the Web, distributed agents would like to discover and access high quality information sources. This is a challenging problem since an agent does...
Young-Woo Seo, Katia P. Sycara
ISI
2005
Springer
15 years 2 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
MHCI
2005
Springer
15 years 2 months ago
ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration
Acontextuality of the mobile phone often leads to a caller’s uncertainty over a callee’s current state, which in turn often hampers mobile collaboration. We are interested in ...
Antti Oulasvirta, Mika Raento, Sauli Tiitta
PODC
2004
ACM
15 years 2 months ago
Completely fair SFE and coalition-safe cheap talk
Secure function evaluation (SFE) enables a group of players, by themselves, to evaluate a function on private inputs as securely as if a trusted third party had done it for them. ...
Matt Lepinski, Silvio Micali, Chris Peikert, Abhi ...
SACMAT
2004
ACM
15 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste