Sciweavers

1715 search results - page 172 / 343
» Trust and Reputation Systems
Sort
View
EUROSYS
2006
ACM
15 years 7 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
ICDE
2005
IEEE
194views Database» more  ICDE 2005»
15 years 11 months ago
Sentiment Mining in WebFountain
WebFountain is a platform for very large-scale text analytics applications that allows uniform access to a wide variety of sources. It enables the deployment of a variety of docum...
Jeonghee Yi, Wayne Niblack
CEC
2007
IEEE
15 years 4 months ago
Evolving cooperation in the non-iterated prisoner's dilemma: A social network inspired approach
— Online service provision is becoming increasingly decentralized as system designers pursue the benefits gained from utilizing nodes at the periphery of the network. However, d...
T. S. Ellis, X. Yao
ICDCSW
2006
IEEE
15 years 4 months ago
Enforcing Truthful-Rating Equilibria in Electronic Marketplaces
Reputation-based mechanisms and policies are vulnerable to the submission of untruthful ratings. In this paper, we define and analyze a game-theoretic model that captures the dyn...
Thanasis G. Papaioannou, George D. Stamoulis
ACSC
2005
IEEE
15 years 3 months ago
SuperstringRep: Reputation-enhanced Service Discovery
1 Service discovery protocols are used in distributed systems to locate services for clients. The services that are located as well as the clients requesting service are commonly a...
Ryan Wishart, Ricky Robinson, Jadwiga Indulska