Sciweavers

2022 search results - page 191 / 405
» Trust in Multi-Agent Systems
Sort
View
SIGIR
2009
ACM
15 years 7 months ago
Learning to recommend with social trust ensemble
As an indispensable technique in the field of Information Filtering, Recommender System has been well studied and developed both in academia and in industry recently. However, mo...
Hao Ma, Irwin King, Michael R. Lyu
69
Voted
ATAL
2005
Springer
15 years 6 months ago
A real-world approach to secure and trusted negotiation in MASs
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti
81
Voted
USS
2008
15 years 3 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
EUROPKI
2009
Springer
14 years 10 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
143
Voted
MAAMAW
1999
Springer
15 years 5 months ago
Cooperative Plan Selection Through Trust
Cooperation plays a fundamental role in multi-agent systems in which individual agents must interact for the overall system to function effectively. However, cooperation inherently...
Nathan Griffiths, Michael Luck