Sciweavers

2846 search results - page 60 / 570
» Personalization of a Trust Network
Sort
View
ATAL
2008
Springer
15 years 4 days ago
An adaptive probabilistic trust model and its evaluation
In open settings, the participants are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relie...
Chung-Wei Hang, Yonghong Wang, Munindar P. Singh
DAC
2007
ACM
15 years 11 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
78
Voted
WOA
2004
14 years 11 months ago
Customer information sharing between e-commerce applications
The management of one-to-one business interaction is challenged by the latency in the acquisition of information about the individual customer's preferences. Although sharing ...
Barbara Negro, Angelo Difino, Fabio Bellifemine, G...
TCCI
2010
14 years 8 months ago
A Cross-Cultural Multi-agent Model of Opportunism in Trade
According to transaction cost economics, contracts are always incomplete and offer opportunities to defect. Some level of trust is a sine qua non for trade. If the seller is better...
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaa...
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 5 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou