Sciweavers

2907 search results - page 51 / 582
» Trust analysis with clustering
Sort
View
AIRWEB
2005
Springer
14 years 3 months ago
Web Spam, Propaganda and Trust
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. ...
Panagiotis Takis Metaxas, Joseph DeStefano
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
14 years 3 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
CCGRID
2007
IEEE
14 years 4 months ago
Executing Large Parameter Sweep Applications on a Multi-VO Testbed
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
DAGSTUHL
2001
13 years 11 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
IADIS
2003
13 years 11 months ago
The Scope and Depth of Privacy Statements on Business-to-Consumer Web Sites
Online privacy statements are capable of dispelling users' fears of data misuse and enhance their trust in Web sites, if their message is communicated effectively. This work-...
Irene Pollach