Sciweavers

1715 search results - page 94 / 343
» Trust and Reputation Systems
Sort
View
CHI
2004
ACM
15 years 10 months ago
How to trust robots further than we can throw them
Panelists with backgrounds in diverse aspects of humanrobot interaction will discuss the challenges of human-robot interaction in terms of operator trust. The panel will showcase ...
David J. Bruemmer, Douglas A. Few, Michael A. Good...
ICPADS
2007
IEEE
15 years 4 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera
CCS
2010
ACM
14 years 8 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
JCS
2007
103views more  JCS 2007»
14 years 9 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
IPPS
2006
IEEE
15 years 3 months ago
Using incentives to increase availability in a DHT
Distributed Hash Tables (DHTs) provide a means to build a completely decentralized, large-scale persistent storage service from the individual storage capacities contributed by ea...
Fabio Picconi, Pierre Sens