Sciweavers

2907 search results - page 30 / 582
» Trust analysis with clustering
Sort
View
FSKD
2007
Springer
158views Fuzzy Logic» more  FSKD 2007»
14 years 4 months ago
LET: Towards More Precise Clustering of Search Results
Web users are always distracted by a large number of results returned from search engines. Clustering can efficiently facilitate users’ browsing pages of certain topic. However...
Yi Zhang, Lidong Bing, Yexin Wang, Yan Zhang
WWW
2009
ACM
14 years 10 months ago
Community gravity: measuring bidirectional effects by trust and rating on online social networks
Several attempts have been made to analyze customer behavior on online E-commerce sites. Some studies particularly emphasize the social networks of customers. Users' reviews ...
Yutaka Matsuo, Hikaru Yamamoto
ECOOP
2005
Springer
14 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
ITRUST
2005
Springer
14 years 3 months ago
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers ...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, A...
USS
2010
13 years 8 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...