Sciweavers

242 search results - page 9 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
IC
2001
14 years 10 months ago
Trust-Based Facilitator for Agent-Based E-Commerce
- In this paper, we propose a facilitator which finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic ...
Chihiro Ono, Dai Kanemoto, Keesoo Kim, Boyd C. Pau...
CIKM
2009
Springer
15 years 4 months ago
StereoTrust: a group based personalized trust model
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
12 years 12 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
WWW
2006
ACM
15 years 10 months ago
Topical TrustRank: using topicality to combat web spam
Web spam is behavior that attempts to deceive search engine ranking algorithms. TrustRank is a recent algorithm that can combat web spam. However, TrustRank is vulnerable in the s...
Baoning Wu, Vinay Goel, Brian D. Davison
SOUPS
2010
ACM
15 years 1 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...