Sciweavers

2022 search results - page 357 / 405
» Trust in Multi-Agent Systems
Sort
View
WWW
2008
ACM
15 years 10 months ago
Larger is better: seed selection in link-based anti-spamming algorithms
Seed selection is of significant importance for the biased PageRank algorithms such as TrustRank to combat link spamming. Previous work usually uses a small seed set, which has a ...
Qiancheng Jiang, Lei Zhang, Yizhen Zhu, Yan Zhang
WWW
2007
ACM
15 years 10 months ago
Brand awareness and the evaluation of search results
We investigate the effect of search engine brand (i.e., the identifying name or logo that distinguishes a product from its competitors) on evaluation of system performance. This r...
Bernard J. Jansen, Mimi Zhang, Ying Zhang
WWW
2007
ACM
15 years 10 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
CHI
2009
ACM
15 years 10 months ago
Resilience through technology adoption: merging the old and the new in Iraq
Little attention has been given to how citizens use technology to be resilient when their country is at war. We report on an ethnographic interview study of how technology was ado...
Gloria Mark, Ban Al-Ani, Bryan Semaan
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
15 years 10 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff