Sciweavers

109 search results - page 14 / 22
» A personalized framework for trust assessment
Sort
View
CHI
1999
ACM
14 years 1 months ago
The Elements of Computer Credibility
Given the importance of credibility in computing products, the research on computer credibility is relatively small. To enhance knowledge about computers and credibility, we defin...
B. J. Fogg, Hsiang Tseng
SECURWARE
2008
IEEE
14 years 3 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
WIKIS
2009
ACM
14 years 1 months ago
Evaluating the trustworthiness of Wikipedia articles through quality and credibility
Wikipedia has become a very popular destination for Web surfers seeking knowledge about a wide variety of subjects. While it contains many helpful articles with accurate informati...
Sai T. Moturu, Huan Liu
AAAI
2008
13 years 11 months ago
Reasoning about the Appropriateness of Proponents for Arguments
Formal approaches to modelling argumentation provide ways to present arguments and counterarguments, and to evaluate which arguments are, in a formal sense, warranted. While these...
Anthony Hunter
WS
2003
ACM
14 years 2 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe