Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
In this paper, we present an approach that aims to study users' past trust decisions (PTDs) for improving the accuracy of detecting phishing sites. Generally, Web users requir...
: This paper describes a new approach for the creation of an adaptive system able to selectively combine dynamic multidimensional information sources to perform state estimation. T...
This paper develops and analyzes distributed search techniques for use in a peer-to-peer (P2P) network-based Information Retrieval (IR) system. In the absence of a centralized med...
Haizheng Zhang, W. Bruce Croft, Brian Neil Levine,...