Sciweavers

1240 search results - page 88 / 248
» Trusted Design in FPGAs
Sort
View
WISEC
2010
ACM
15 years 5 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
RECSYS
2009
ACM
15 years 4 months ago
Using a trust network to improve top-N recommendation
Top-N item recommendation is one of the important tasks of recommenders. Collaborative filtering is the most popular approach to building recommender systems which can predict ra...
Mohsen Jamali, Martin Ester
ICDM
2007
IEEE
101views Data Mining» more  ICDM 2007»
15 years 4 months ago
Lightweight Distributed Trust Propagation
Using mobile devices, such as smart phones, people may create and distribute different types of digital content (e.g., photos, videos). One of the problems is that digital content...
Daniele Quercia, Stephen Hailes, Licia Capra
WETICE
2005
IEEE
15 years 3 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
ITRUST
2004
Springer
15 years 3 months ago
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities
This paper presents the design of a new middleware which provides support for trust and accountability in distributed data sharing communities. One application is in the context of...
Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Re...