Sciweavers

2846 search results - page 15 / 570
» Personalization of a Trust Network
Sort
View
TRUST
2010
Springer
14 years 8 months ago
The Role of Soft Information in Trust Building: Evidence from Online Social Lending
We analyze empirical data of Germany’s largest online social lending platform Smava.de to exemplarily study the contribution of unstructured, ambiguous, or unverified informatio...
Stefanie Pötzsch, Rainer Böhme
SENSYS
2009
ACM
15 years 4 months ago
SensorTrust: a resilient trust model for WSNs
Guoxing Zhan, Weisong Shi, Julia Deng
AAAI
2008
15 years 8 days ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
SIGSOFT
2004
ACM
15 years 3 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
ACSAC
1998
IEEE
15 years 2 months ago
Security Services in an Open Service Environment
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Reiner Sailer