Sciweavers

2022 search results - page 232 / 405
» Trust in Multi-Agent Systems
Sort
View
UM
2007
Springer
14 years 3 months ago
Understanding the Utility of Rationale in a Mixed-Initiative System for GUI Customization
In this paper, we investigate the utility of providing users with the system’s rationale in a mixed-initiative system for GUI customization. An evaluation comparing a version of ...
Andrea Bunt, Joanna McGrenere, Cristina Conati
WWW
2008
ACM
14 years 10 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
ICDCIT
2004
Springer
14 years 3 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
TRUST
2010
Springer
14 years 2 months ago
Oblivious Transfer Based on Physical Unclonable Functions
us Transfer based on Physical Unclonable Functions (Extended Abstract)" Session 2 (Tuesday 15:00 - 16:30) Place: „Salon Tiergarten“ 15:00-15:30 Patrick Koeberl (Intel; Ire...
Ulrich Rührmair
ICICS
2005
Springer
14 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...