Sciweavers

1715 search results - page 271 / 343
» Trust and Reputation Systems
Sort
View
ACMSE
2008
ACM
14 years 12 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
BCSHCI
2007
14 years 11 months ago
"The devil you know knows best": how online recommendations can benefit from social networking
The defining characteristic of the Internet today is an abundance of information and choice. Recommender Systems (RS), designed to alleviate this problem, have so far not been ver...
Philip Bonhard, Martina Angela Sasse, Clare Harrie...
PERVASIVE
2006
Springer
14 years 9 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
ECWEB
2010
Springer
162views ECommerce» more  ECWEB 2010»
14 years 7 months ago
The Open Metaverse Currency (OMC) - A Micropayment Framework for Open 3D Virtual Worlds
: Virtual worlds have become very popular recently, in particular 3D virtual worlds with a built-in virtual currency that enables providers and users to monetize their creations. V...
Frank Kappe, Michael Steurer
COLING
2010
14 years 4 months ago
A Minimum Error Weighting Combination Strategy for Chinese Semantic Role Labeling
Many Semantic Role Labeling (SRL) combination strategies have been proposed and tested on English SRL task. But little is known about how much Chinese SRL can benefit from system ...
Tao Zhuang, Chengqing Zong