Sciweavers

1715 search results - page 239 / 343
» Trust and Reputation Systems
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
14 years 9 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
SDM
2010
SIAM
217views Data Mining» more  SDM 2010»
14 years 8 months ago
Collaborative Filtering: Weighted Nonnegative Matrix Factorization Incorporating User and Item Graphs
Collaborative filtering is an important topic in data mining and has been widely used in recommendation system. In this paper, we proposed a unified model for collaborative fil...
Quanquan Gu, Jie Zhou, Chris H. Q. Ding
WWW
2009
ACM
15 years 10 months ago
Learning to recognize reliable users and content in social media with coupled mutual reinforcement
Community Question Answering (CQA) has emerged as a popular forum for users to pose questions for other users to answer. Over the last few years, CQA portals such as Naver and Yah...
Jiang Bian, Yandong Liu, Ding Zhou, Eugene Agichte...
KCAP
2005
ACM
15 years 3 months ago
User-centered consultation by a society of agents
User-centered consultation systems can be viewed as systems with trust in the competence of the user, whereas conventional knowledge systems are often based on some mistrust. By o...
Georg Buscher, Joachim Baumeister, Frank Puppe, Di...