Sciweavers

138 search results - page 12 / 28
» A Probabilistic Approach for Maintaining Trust Based on Evid...
Sort
View
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 3 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
FLAIRS
2007
13 years 11 months ago
Probabilistic Task Content Modeling for Episodic Textual Narratives
Episodic knowledge is often stored in the form of textual narratives written in natural language. However, a large repository of such narratives will contain both repetitive and n...
Eni Mustafaraj, Martin Hoof, Bernd Freisleben
ICDE
2011
IEEE
200views Database» more  ICDE 2011»
13 years 21 days ago
Deriving probabilistic databases with inference ensembles
— Many real-world applications deal with uncertain or missing data, prompting a surge of activity in the area of probabilistic databases. A shortcoming of prior work is the assum...
Julia Stoyanovich, Susan B. Davidson, Tova Milo, V...
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
14 years 2 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
CONCURRENCY
2008
99views more  CONCURRENCY 2008»
13 years 9 months ago
TRIBLER: a social-based peer-to-peer system
Most current P2P file sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them. However, social phenomena...
Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno ...