Sciweavers

2846 search results - page 3 / 570
» Personalization of a Trust Network
Sort
View
SAC
2006
ACM
15 years 3 months ago
Trust-enhanced visibility for personalized document recommendations
Documents are recommended by computer-based systems normally according to their prominence in the document reference network. Based on the requirements identified in a concrete u...
Claudia Hess, Klaus Stein, Christoph Schlieder
COMPSAC
2006
IEEE
15 years 4 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
PST
2008
14 years 11 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
MOBISYS
2008
ACM
15 years 9 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
EXPERT
2011
116views more  EXPERT 2011»
14 years 4 months ago
Trust- and Distrust-Based Recommendations for Controversial Reviews
Recommender systems that incorporate a social trust network among their users have the potential to make more personalized recommendations compared to traditional collaborative ...
Patricia Victor, Chris Cornelis, Martine De Cock, ...