Sciweavers

791 search results - page 88 / 159
» Users and Trust in Cyberspace
Sort
View
WWW
2008
ACM
14 years 8 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 9 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
WWW
2010
ACM
14 years 2 months ago
Highlighting disputed claims on the web
We describe Dispute Finder, a browser extension that alerts a user when information they read online is disputed by a source that they might trust. Dispute Finder examines the tex...
Rob Ennals, Beth Trushkowsky, John Mark Agosta
IUI
2003
ACM
14 years 29 days ago
A zero-input interface for leveraging group experience in web browsing
The experience of a trusted group of colleagues can help users improve the quality and focus of their browsing and searching activities. How could a system provide such help, when...
Taly Sharon, Henry Lieberman, Ted Selker
JCSS
2006
102views more  JCSS 2006»
13 years 7 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh