Sciweavers

1229 search results - page 102 / 246
» Trusted Computing
Sort
View
WEBI
2004
Springer
15 years 3 months ago
Eliciting Truthful Feedback for Binary Reputation Mechanisms
Reputation mechanisms offer an efficient way of building the necessary level of trust in electronic markets. Feedback about an agent’s past behavior can be aggregated into a me...
Radu Jurca, Boi Faltings
EUROPAR
2003
Springer
15 years 3 months ago
Incentives for Combatting Freeriding on P2P Networks
We address the freerider problem on P2P networks. We first propose a specific participation metric, which we call a peer’s EigenTrust score. We show that EigenTrust scores accu...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
OSDI
2008
ACM
15 years 10 months ago
Device Driver Safety Through a Reference Validation Mechanism
Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them withou...
Dan Williams, Emin Gün Sirer, Fred B. Schneid...
SEMWEB
2004
Springer
15 years 3 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin
CHI
1999
ACM
15 years 2 months ago
The Elements of Computer Credibility
Given the importance of credibility in computing products, the research on computer credibility is relatively small. To enhance knowledge about computers and credibility, we defin...
B. J. Fogg, Hsiang Tseng