Sciweavers

1715 search results - page 229 / 343
» Trust and Reputation Systems
Sort
View
MOBILITY
2009
ACM
15 years 2 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
WIKIS
2009
ACM
15 years 2 months ago
Evaluating the trustworthiness of Wikipedia articles through quality and credibility
Wikipedia has become a very popular destination for Web surfers seeking knowledge about a wide variety of subjects. While it contains many helpful articles with accurate informati...
Sai T. Moturu, Huan Liu
SEMWEB
2009
Springer
15 years 2 months ago
Semantic Provenance for Science Data Products: Application to Image Data Processing
—A challenge in providing scientific data services to a broad user base is to also provide the metadata services and tools the user base needs to correctly interpret and trust t...
Stephan Zednik, Peter Fox, Deborah L. McGuinness, ...
SC
2000
ACM
15 years 2 months ago
Parallel Phylogenetic Inference
Recent advances in DNA sequencing technology have created large data sets upon which phylogenetic inference can be performed. However, current research is limited by the prohibiti...
Quinn Snell, Michael Whiting, Mark J. Clement, Dav...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 2 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen