Sciweavers

162 search results - page 30 / 33
» Semantics of Trust
Sort
View
SEMWEB
2010
Springer
13 years 5 months ago
Preference-Based Web Service Composition: A Middle Ground between Execution and Search
Abstract. Much of the research on automated Web Service Composition (WSC) relates it to an AI planning task, where the composition is primarily done offline prior to execution. Rec...
Shirin Sohrabi, Sheila A. McIlraith
DALT
2010
Springer
13 years 2 months ago
Understanding Permissions through Graphical Norms
Abstract. Norm-aware agents are able to reason about the obligations, permissions and prohibitions that affect their operation. While much work has focused on the creation of such ...
Nir Oren, Madalina Croitoru, Simon Miles, Michael ...
HOST
2011
IEEE
12 years 7 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
SAC
2005
ACM
14 years 1 months ago
A trust-enhanced recommender system application: Moleskiing
Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity bet...
Paolo Avesani, Paolo Massa, Roberto Tiella
POPL
2012
ACM
12 years 3 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka