Sciweavers

1022 search results - page 63 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
IMC
2010
ACM
14 years 7 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
MHCI
2009
Springer
15 years 4 months ago
An evaluation of authoring interfaces for image-based navigation
We present the development and evaluation of an authoring system for image-based pedestrian navigation which lets authors take pictures and annotate instructions on the go in thre...
Benjamin Walther-Franks, Dirk Wenig, Rainer Malaka...
CDC
2009
IEEE
120views Control Systems» more  CDC 2009»
15 years 2 months ago
Towards constant velocity Navigation and collision avoidance for autonomous nonholonomic aircraft-like vehicles
Abstract— This paper presents a methodology for the decentralised control of multiple 3-dimensional nonholonomic agents. The proposed control scheme is based on Navigation Functi...
Giannis P. Roussos, Kostas J. Kyriakopoulos
DIM
2009
ACM
15 years 4 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
ASIACRYPT
2000
Springer
15 years 2 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas