Sciweavers

1351 search results - page 124 / 271
» Trust in Anonymity Networks
Sort
View
COMAD
2009
13 years 11 months ago
Trust-Based Infinitesimals for Enhanced Collaborative Filtering
In this paper we propose a novel recommender system which enhances user-based collaborative filtering by using a trust-based social network. Our main idea is to use infinitesimal ...
Maria Chowdhury, Alex Thomo, William W. Wadge
EKAW
2010
Springer
13 years 8 months ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...
IMC
2007
ACM
13 years 11 months ago
Issues and etiquette concerning use of shared measurement data
In this note we discuss issues surrounding how to provide and use network measurement data made available for sharing among researchers. While previous work has focused on the tec...
Mark Allman, Vern Paxson
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 10 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
CN
2004
108views more  CN 2004»
13 years 10 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark