Sciweavers

413 search results - page 73 / 83
» Dirichlet Reputation Systems
Sort
View
EPEW
2008
Springer
13 years 9 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel
JSAC
2007
117views more  JSAC 2007»
13 years 7 months ago
Spectrum sharing for unlicensed bands
We study a spectrum sharing problem in an unlicensed band where multiple systems coexist and interfere with each other. Due to asymmetries and selfish system behavior, unfair and...
Raul Etkin, Abhay Parekh, David Tse
CHI
2005
ACM
14 years 8 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
ICDCSW
2007
IEEE
14 years 1 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
14 years 1 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch