Sciweavers

683 search results - page 20 / 137
» Voting Technologies and Trust
Sort
View
IDA
2007
Springer
14 years 9 months ago
Voting experts: An unsupervised algorithm for segmenting sequences
We describe a statistical signature of chunks and an algorithm for finding chunks. While there is no formal definition of chunks, they may be reliably identified as configurat...
Paul R. Cohen, Niall M. Adams, Brent Heeringa
88
Voted
IJNSEC
2007
157views more  IJNSEC 2007»
14 years 9 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
68
Voted
WETICE
2000
IEEE
15 years 1 months ago
Walking the Web of Trust
Most currently deployed Public Key Infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usa...
Germano Caronni
DASC
2006
IEEE
15 years 3 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu
SAC
2006
ACM
15 years 3 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland