Sciweavers

2022 search results - page 353 / 405
» Trust in Multi-Agent Systems
Sort
View
ECIS
2001
14 years 11 months ago
The golden circle: A case study of organizational change at the London Ambulance Service
This paper analyzes the way in which the London Ambulance Service (LAS) recovered from the events of October 1992, when it implemented a computer aided despatch system (LASCAD) th...
Kathy McGrath
93
Voted
CHI
2008
ACM
14 years 11 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
ADVCS
2008
140views more  ADVCS 2008»
14 years 10 months ago
Reputation for Innovating Social Networks
Reputation is a fundamental instrument of partner selection. Developed within the domain of electronic auctions, reputation technology is being been imported into other applicatio...
Rosaria Conte, Mario Paolucci, Jordi Sabater-Mir
IAJIT
2010
157views more  IAJIT 2010»
14 years 8 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
KES
2008
Springer
14 years 8 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail