Sciweavers

3299 search results - page 168 / 660
» Privacy and Trusted Computing
Sort
View
154
Voted
ICCV
2009
IEEE
15 years 2 months ago
Large-scale privacy protection in Google Street View
Andrea Frome, German Cheung, Ahmad Abdulkader, Mar...
CHI
2009
ACM
16 years 5 months ago
In CMC we trust: the role of similarity
This paper examines how different forms of linguistic similarity in a text-chat environment relate to the establishment of interpersonal trust. Sixty-two pairs played an iterative...
Lauren E. Scissors, Alastair J. Gill, Kathleen Ger...
JUCS
2010
89views more  JUCS 2010»
15 years 3 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
147
Voted
CSE
2009
IEEE
15 years 2 months ago
The Influence of Personalities Upon the Dynamics of Trust and Reputation
When an agent resides in a community, the opinion of other community members concerning whether a particular individual is trustworthy or not influences the trust level of this ag...
Mark Hoogendoorn, S. Waqar Jaffry
NDSS
2006
IEEE
15 years 11 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...