Sciweavers

391 search results - page 21 / 79
» Attack-Resistance of Computational Trust Models
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
ISEM
2008
88views more  ISEM 2008»
13 years 8 months ago
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments
As it lacks central management in Peer-to-Peer (P2P) e-commerce environments, prior to new transactions with an unknown peer, the trust evaluation is critical, which relies on the ...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
ICCS
2005
Springer
14 years 1 months ago
Adaptive Model Trust Region Methods for Generalized Eigenvalue Problems
Computing a few eigenpairs of large-scale matrices is a significant problem in science and engineering applications and a very active area of research. In this paper, two methods...
Pierre-Antoine Absil, C. G. Baker, Kyle A. Galliva...
CCS
2010
ACM
13 years 6 months ago
Assessing trust in uncertain information using Bayesian description logic
Decision makers (humans or software agents alike) are faced with the challenge of examining large volumes of information originating from heterogeneous sources with the goal of as...
Achille Fokoue, Mudhakar Srivatsa, Robert Young
ICIS
2000
13 years 9 months ago
Trading partner trust in electronic commerce participation
The growth of business-to-business e-commerce has highlighted the role of computer and communications technologies as well as inter-organizational trust in developing and maintain...
Pauline Ratnasingham, Kuldeep Kumar