Sciweavers

1229 search results - page 102 / 246
» Trusted Computing
Sort
View
125
Voted
WEBI
2004
Springer
15 years 7 months ago
Eliciting Truthful Feedback for Binary Reputation Mechanisms
Reputation mechanisms offer an efficient way of building the necessary level of trust in electronic markets. Feedback about an agent’s past behavior can be aggregated into a me...
Radu Jurca, Boi Faltings
68
Voted
EUROPAR
2003
Springer
15 years 7 months ago
Incentives for Combatting Freeriding on P2P Networks
We address the freerider problem on P2P networks. We first propose a specific participation metric, which we call a peer’s EigenTrust score. We show that EigenTrust scores accu...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
OSDI
2008
ACM
16 years 2 months ago
Device Driver Safety Through a Reference Validation Mechanism
Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them withou...
Dan Williams, Emin Gün Sirer, Fred B. Schneid...
104
Voted
SEMWEB
2004
Springer
15 years 7 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin
113
Voted
CHI
1999
ACM
15 years 6 months ago
The Elements of Computer Credibility
Given the importance of credibility in computing products, the research on computer credibility is relatively small. To enhance knowledge about computers and credibility, we defin...
B. J. Fogg, Hsiang Tseng