Sciweavers

1022 search results - page 5 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
14 years 10 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
KESAMSTA
2010
Springer
14 years 7 months ago
Engaging the Dynamics of Trust in Computational Trust and Reputation Systems
Computational Trust and Reputation (CTR) systems are essential in electronic commerce to encourage interactions and suppress deceptive behaviours. This paper focus on comparing two...
Agnieszka Danek, Joana Urbano, Ana Paula Rocha, Eu...
AGENTS
2000
Springer
15 years 2 months ago
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
We will examine in this paper three crucial aspects of trust dynamics: a) How A’s trusting B and relying on it in situation can actually (objectively) influence B’s trustworth...
Rino Falcone, Cristiano Castelfranchi
ATC
2006
Springer
14 years 11 months ago
Autonomic and Trusted Computing Paradigms
The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-...
Xiaolin Li, Hui Kang, Patrick Harrington, Johnson ...
ATAL
1999
Springer
15 years 1 months ago
Toward a Methodology for AI Architecture Evaluation: Comparing Soar and CLIPS
We propose a methodology that can be used to compare and evaluate Artificial Intelligence architectures and is motivated by fundamental properties required by general intelligent ...
Scott A. Wallace, John E. Laird