Sciweavers

4142 search results - page 183 / 829
» Trusting an Information Agent
Sort
View
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
15 years 11 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
ICICS
2003
Springer
15 years 9 months ago
Practical Service Charge for P2P Content Distribution
With emerging decentralized technologies, peer-to-peer (P2P) content distribution arises as a new model for storage and transmission of data. In this scenario, one peer can be play...
Jose Antonio Onieva, Jianying Zhou, Javier Lopez
TKDE
2011
182views more  TKDE 2011»
14 years 11 months ago
Data Leakage Detection
—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
IADIS
2003
15 years 5 months ago
The Scope and Depth of Privacy Statements on Business-to-Consumer Web Sites
Online privacy statements are capable of dispelling users' fears of data misuse and enhance their trust in Web sites, if their message is communicated effectively. This work-...
Irene Pollach
AAAI
2004
15 years 5 months ago
Performance Bounded Reinforcement Learning in Strategic Interactions
Despite increasing deployment of agent technologies in several business and industry domains, user confidence in fully automated agent driven applications is noticeably lacking. T...
Bikramjit Banerjee, Jing Peng