Sciweavers

4897 search results - page 74 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
HICSS
2009
IEEE
179views Biometrics» more  HICSS 2009»
14 years 4 months ago
Understanding Continuance Intention of Knowledge Creation in Online Communities from a Social-Psychological Perspective
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Shih-Wei Chou, Ching-Chang Lee, Yu-Chieh Chang, Ch...
EUROSYS
2006
ACM
14 years 6 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
FC
1997
Springer
107views Cryptology» more  FC 1997»
14 years 22 days ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
SAC
2006
ACM
14 years 3 months ago
Trust-enhanced visibility for personalized document recommendations
Documents are recommended by computer-based systems normally according to their prominence in the document reference network. Based on the requirements identified in a concrete u...
Claudia Hess, Klaus Stein, Christoph Schlieder
IPPS
2006
IEEE
14 years 3 months ago
Towards building a highly-available cluster based model for high performance computing
In recent years, we have witnessed a growing interest in high performance computing (HPC) using a cluster of workstations. However, many challenges remain to be resolved before th...
Azzedine Boukerche, Raed Al-Shaikh, Mirela Sechi M...