Sciweavers

791 search results - page 24 / 159
» Users and Trust in Cyberspace
Sort
View
IDEAS
2009
IEEE
104views Database» more  IDEAS 2009»
14 years 2 months ago
An organizational file permission management system using the cellular data system
In designing dynamic situations such as cyberworlds, we the Incrementally Modular Abstraction Hierarchy (IMAH) to be an appropriate mathematical background to model dynamically ch...
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki
MMMACNS
2010
Springer
13 years 6 months ago
Symptoms-Based Detection of Bot Processes
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SAC
2005
ACM
14 years 1 months ago
A trust-enhanced recommender system application: Moleskiing
Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity bet...
Paolo Avesani, Paolo Massa, Roberto Tiella
EKAW
2010
Springer
13 years 6 months ago
Extending Open Rating Systems for Ontology Ranking and Reuse
Abstract. Ontology reuse saves costs and improves interoperability between ontologies. Knowing which ontology to reuse is difficult without having a quality assessment. We employ u...
Holger Lewen, Mathieu d'Aquin