Sciweavers

4897 search results - page 91 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
WWW
2009
ACM
14 years 10 months ago
Seller's credibility in electronic markets: a complex network based approach
In the last decade, there has been an explosion of online commercial activity enabled by the World Wide Web. An electronic marketplace (e-market) provides an online method to perf...
Adriano M. Pereira, Arlei Silva, Wagner Meira Jr.,...
LREC
2010
186views Education» more  LREC 2010»
13 years 10 months ago
WITcHCRafT: A Workbench for Intelligent exploraTion of Human ComputeR conversaTions
We present Witchcraft, an open-source framework for the evaluation of prediction models for spoken dialogue systems based on interaction logs and audio recordings. The use of Witc...
Alexander Schmitt, Gregor Bertrand, Tobias Heinrot...
DSOM
2003
Springer
14 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
ACSAC
2004
IEEE
14 years 29 days ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe