Sciweavers

2022 search results - page 304 / 405
» Trust in Multi-Agent Systems
Sort
View
JAIR
2008
96views more  JAIR 2008»
15 years 12 days ago
On the Value of Correlation
Correlated equilibrium generalizes Nash equilibrium to allow correlation devices. Correlated equilibrium captures the idea that in many systems there exists a trusted administrato...
Itai Ashlagi, Dov Monderer, Moshe Tennenholtz
103
Voted
CN
2004
106views more  CN 2004»
15 years 8 days ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
113
Voted
ICDAR
2009
IEEE
14 years 10 months ago
Style-Based Ballot Mark Recognition
The push toward voting via hand-marked paper ballots has focused attention on the limitations of current optical scan systems. Discrepancies between human and machine interpretati...
Pingping Xiu, Daniel P. Lopresti, Henry S. Baird, ...
121
Voted
WWW
2011
ACM
14 years 7 months ago
Wikipedia vandalism detection
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
Santiago Moisés Mola-Velasco
ASPLOS
2012
ACM
13 years 8 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee