Sciweavers

1022 search results - page 5 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 8 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
KESAMSTA
2010
Springer
13 years 5 months ago
Engaging the Dynamics of Trust in Computational Trust and Reputation Systems
Computational Trust and Reputation (CTR) systems are essential in electronic commerce to encourage interactions and suppress deceptive behaviours. This paper focus on comparing two...
Agnieszka Danek, Joana Urbano, Ana Paula Rocha, Eu...
AGENTS
2000
Springer
13 years 12 months ago
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
We will examine in this paper three crucial aspects of trust dynamics: a) How A’s trusting B and relying on it in situation can actually (objectively) influence B’s trustworth...
Rino Falcone, Cristiano Castelfranchi
ATC
2006
Springer
13 years 9 months ago
Autonomic and Trusted Computing Paradigms
The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-...
Xiaolin Li, Hui Kang, Patrick Harrington, Johnson ...
ATAL
1999
Springer
13 years 12 months ago
Toward a Methodology for AI Architecture Evaluation: Comparing Soar and CLIPS
We propose a methodology that can be used to compare and evaluate Artificial Intelligence architectures and is motivated by fundamental properties required by general intelligent ...
Scott A. Wallace, John E. Laird