Sciweavers

162 search results - page 11 / 33
» The Design of a Trustworthy Voting System
Sort
View
INFOCOM
2011
IEEE
14 years 3 months ago
SocialFilter: Introducing social trust to collaborative spam mitigation
—We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on wheth...
Michael Sirivianos, Kyungbaek Kim, Xiaowei Yang
VOTEID
2007
Springer
15 years 5 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
74
Voted
ATAL
2005
Springer
15 years 5 months ago
Voting policies that cope with unreliable agents
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-TaskAgen...
Christian Guttmann, Ingrid Zukerman
MUM
2009
ACM
144views Multimedia» more  MUM 2009»
15 years 6 months ago
UbiRockMachine: a multimodal music voting service for shared urban spaces
In this paper we suggest a conceptual architecture for music systems, designed to shift the control over a shared urban space to the users themselves, and also to encourage social...
Hannu Kukka, Rodolfo Patino, Timo Ojala
COMPSAC
2008
IEEE
15 years 1 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma