Sciweavers

791 search results - page 58 / 159
» Users and Trust in Cyberspace
Sort
View
AIRWEB
2005
Springer
14 years 1 months ago
Web Spam, Propaganda and Trust
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. ...
Panagiotis Takis Metaxas, Joseph DeStefano
UM
2007
Springer
14 years 1 months ago
Understanding the Utility of Rationale in a Mixed-Initiative System for GUI Customization
In this paper, we investigate the utility of providing users with the system’s rationale in a mixed-initiative system for GUI customization. An evaluation comparing a version of ...
Andrea Bunt, Joanna McGrenere, Cristina Conati
WWW
2005
ACM
14 years 8 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
HICSS
2008
IEEE
139views Biometrics» more  HICSS 2008»
14 years 2 months ago
Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities
This paper builds upon action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing...
Brian Thoms, Nathan Garrett, Jesus Canelon Herrera...
EDOC
2006
IEEE
14 years 1 months ago
Trust Assessment Using Provenance in Service Oriented Applications
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible ng...
Shrija Rajbhandari, Arnaud Contes, Omer F. Rana, V...