Sciweavers

1715 search results - page 245 / 343
» Trust and Reputation Systems
Sort
View
FAC
2008
64views more  FAC 2008»
14 years 10 months ago
Testing a deterministic implementation against a non-controllable non-deterministic stream X-machine
A stream X-machine is a type of extended finite state machine with an associated development approach that consists of building a system from a set of trusted components. One of th...
Robert M. Hierons, Florentin Ipate
JAIR
2008
96views more  JAIR 2008»
14 years 10 months ago
On the Value of Correlation
Correlated equilibrium generalizes Nash equilibrium to allow correlation devices. Correlated equilibrium captures the idea that in many systems there exists a trusted administrato...
Itai Ashlagi, Dov Monderer, Moshe Tennenholtz
CN
2004
106views more  CN 2004»
14 years 9 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
ICDAR
2009
IEEE
14 years 7 months ago
Style-Based Ballot Mark Recognition
The push toward voting via hand-marked paper ballots has focused attention on the limitations of current optical scan systems. Discrepancies between human and machine interpretati...
Pingping Xiu, Daniel P. Lopresti, Henry S. Baird, ...
WWW
2011
ACM
14 years 4 months ago
Wikipedia vandalism detection
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
Santiago Moisés Mola-Velasco