Sciweavers

1715 search results - page 176 / 343
» Trust and Reputation Systems
Sort
View
TLDI
2010
ACM
247views Formal Methods» more  TLDI 2010»
15 years 7 months ago
F-ing modules
ML modules are a powerful language mechanism for decomposing programs into reusable components. Unfortunately, they also have a reputation for being “complex” and requiring fa...
Andreas Rossberg, Claudio V. Russo, Derek Dreyer
99
Voted
CIKM
2005
Springer
15 years 3 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
76
Voted
OSDI
2006
ACM
15 years 10 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
DISCEX
2003
IEEE
15 years 3 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
ATAL
2001
Springer
15 years 2 months ago
Formalizing a Language for Institutions and Norms
One source of trust for physical trading systems is their physical assets and simply their presence. A similar baseline does not exist for electronic trading systems, but one way i...
Marc Esteva, Julian A. Padget, Carles Sierra