Sciweavers

1715 search results - page 171 / 343
» Trust and Reputation Systems
Sort
View
UM
2007
Springer
15 years 4 months ago
Understanding the Utility of Rationale in a Mixed-Initiative System for GUI Customization
In this paper, we investigate the utility of providing users with the system’s rationale in a mixed-initiative system for GUI customization. An evaluation comparing a version of ...
Andrea Bunt, Joanna McGrenere, Cristina Conati
100
Voted
WWW
2008
ACM
15 years 11 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
102
Voted
ICDCIT
2004
Springer
15 years 3 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
73
Voted
TRUST
2010
Springer
15 years 3 months ago
Oblivious Transfer Based on Physical Unclonable Functions
us Transfer based on Physical Unclonable Functions (Extended Abstract)" Session 2 (Tuesday 15:00 - 16:30) Place: „Salon Tiergarten“ 15:00-15:30 Patrick Koeberl (Intel; Ire...
Ulrich Rührmair
86
Voted
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...