A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mobility in Collaborative Alert Systems: Building Trust through Reputation
[chapter]
2011
Lecture Notes in Computer Science
However, for this alert information to be useful in the context of CIDN networks, certain trust and reputation mechanisms determining the credibility of a particular mobile node, and the alerts it provides ...
This is the main objective of this paper, where an inter-domain trust and reputation model, together with an architecture for inter-domain collaboration, are presented with the main aim of improving the ...
Collaborative alert systems provide the basis for building a global knowledge of alerts, based on the cooperation of all members of the system, to increase the accuracy in detecting distributed threats ...
doi:10.1007/978-3-642-23041-7_24
fatcat:boirhvacvraafgxo6u44racp34
Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
2010
Journal of Network and Systems Management
In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN). ...
In particular, we design a trust model that allows each IDS to evaluate the trustworthiness of other IDSes based on its personal experience. ...
For the newcomer attack, malicious nodes white-wash their bad history and re-register as new users to the system. However, it is quite difficult for a newcomer to succeed in our system. ...
doi:10.1007/s10922-010-9176-7
fatcat:gwpn2tl37vbgzhbaili5mtx2d4
How Newcomers' Work-Related Use of Enterprise Social Media Affects Their Thriving at Work—The Swift Guanxi Perspective
2019
Sustainability
A valid sample consisted of 77 new employee-veteran dyads in a large telecom company was used in Smart-PLS to test our research model. ...
The findings provide new insights for organizations to better manage the use of ESM to improve newcomers' thriving at work. ...
Acknowledgments: We are very grateful to the editor Hank Liu and several anonymous reviewers giving their valuable suggestions and comments for improving the quality of our paper. ...
doi:10.3390/su11102794
fatcat:lqw5pzxyunaodbpknh4dgyckbq
A Survey of Trust Management in the Internet of Vehicles
2021
Electronics
intelligent transportation systems (ITS), wherein vehicles establish a belief towards their peers in the pursuit of ensuring safe and efficacious traffic flows. ...
In the course of vehicles forming perceptions towards other participating vehicles, a range of contributing parameters regarding the interactions among these vehicles are accumulated to establish a final ...
To overcome the negative impacts of the said punishing strategy, i.e., the lack of collaboration opportunities available for the newcomer due to a low trust score, a trust based vehicular coalition formation ...
doi:10.3390/electronics10182223
fatcat:jqghqqcdv5f4xgbc3mibc2riby
A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks
2009
2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns
By design, the framework also houses a rule-based mechanism to thwart misbehaving behaviour or non-cooperation. ...
The work in this thesis is aimed at defining a framework for such an ad hoc network that provides ways for participants to distinguish and collaborate with their most trustworthy neighbours. ...
In so far as trust generation is concerned, simulations (both software-based and physical) can be carried out on using various other bootstrapping mechanisms in order to find a most suitable one. ...
doi:10.1109/computationworld.2009.62
fatcat:vtoz27ksj5aqvpesmjei5by5ju
Efficient Certification Path Discovery for MANET
2010
EURASIP Journal on Wireless Communications and Networking
Our scheme is based on a binary tree formation of the network's nodes. ...
The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided ...
Another credit-based system for MANETs called Sprite is proposed in [22] . Sprite uses a credit system to provide incentives for nodes that collaborate and report actions truthfully. ...
doi:10.1155/2010/243985
fatcat:p2tergeiwbayfgwbh6a3zzr3ce
A Survey on Metaverse: Fundamentals, Security, and Privacy
[article]
2022
arXiv
pre-print
Finally, we draw open research directions for building future metaverse systems. ...
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize ...
power systems using reputation •Fast aggressive attacker detection using the PowerWorld simulator •Lack credibility analysis for historical operations in reputation evaluation Dirichlet-based probabilistic ...
arXiv:2203.02662v2
fatcat:k5ba4o3lbbarljwgrrqftamlue
Make new friends, but keep the old
2009
Proceedings of the 27th international conference on Human factors in computing systems - CHI 09
We evaluated four recommender algorithms in an enterprise social networking site using a personalized survey of 500 users and a field study of 3,000 users. ...
Algorithms based on social network information were able to produce better-received recommendations and find more known contacts for users, while algorithms using similarity of user-created content were ...
[18] built a hybrid alert filtering system combining collaborative filtering techniques and the content features extracted from the alert message itself. ...
doi:10.1145/1518701.1518735
dblp:conf/chi/ChenGDMG09
fatcat:wplorjqkqjepjiepcbl3zqiunu
D2.3: Platform Functionality Requirements & Specification Report
2019
Zenodo
The ambition of EU-Citizen.Science is to build, fill, and promote a sustainable platform and mutual learning space providing different tools, best practice examples and relevant scientific outcomes that ...
in Europe. ...
for teachers) but it needs to create a reputation for being the best place to go. ...
doi:10.5281/zenodo.3612807
fatcat:4e2hxvggbvamzjzeobeia2grye
5GZORRO_D2.2: Design of the 5GZORRO Platform for Security & Trust
2021
Zenodo
Consensus A consensus mechanism is required for network member nodes to agree on ledger updates, a principal element in building trust between transaction participants. ...
DLT Transaction Model Ultimately a DLT system is simply a decentralized mechanism to execute transactions and store the results (updated state) in a distributed system. ...
doi:10.5281/zenodo.5561042
fatcat:o5ecnvwvifhmveigarvfgih3l4
Structuring the world's knowledge: Socio-technical processes and data quality in Wikidata
2019
Figshare
PhD Thesis covering socio-tecnical processes and data quality in Wikidata.Abstract: Wikidata is a collaborative knowledge graph by the Wikimedia Foundation. ...
These features have drawn the attention of a growing number of researchers and practitioners from several fields. Nevertheless, research about collaboration processes in Wikidata is still scarce. ...
Data For the purpose of analysis, this thesis uses data from the Wikidata historical dumps, Online knowledge collaboration Socio-technical systems are 'social systems sitting upon a technical base' (Whitworth ...
doi:10.6084/m9.figshare.10998791.v1
fatcat:7apohgf4zvbnfa426zgsekq6sy
Structuring the world's knowledge: Socio-technical processes and data quality in Wikidata
2019
Figshare
PhD Thesis covering socio-tecnical processes and data quality in Wikidata.Abstract: Wikidata is a collaborative knowledge graph by the Wikimedia Foundation. ...
These features have drawn the attention of a growing number of researchers and practitioners from several fields. Nevertheless, research about collaboration processes in Wikidata is still scarce. ...
Data For the purpose of analysis, this thesis uses data from the Wikidata historical dumps, Online knowledge collaboration Socio-technical systems are 'social systems sitting upon a technical base' (Whitworth ...
doi:10.6084/m9.figshare.10998791
fatcat:n7qfv5yefndrvfko24uy5rwtwm
The Patras Blended Strategy Model for Deep and Meaningful Learning in Quality Life-Long Distance Education
2019
The Electronic Journal of e-Learning
Based on the experiences in distance lifelong learning programmes in the University of Patras' Educational Center for Life-Long Learning (KEDIVIM) the authors present how the principles and attributes ...
In the context of distance education inlife-long learning, one important challenge is the design of versatile quality assurance strategies for e-training. ...
We would like to thank Slavka Madarova for her help with translating this document. The utilisation of technology for educational purposes is widely supported in literature. ...
doi:10.34190/jel.17.2.01
fatcat:ziy67fc6evfklbwreidhd5ww6q
Can online buddies and bandwagon cues enhance user participation in online health communities?
2014
Computers in Human Behavior
The study constructed a prototype of an online health community website for the experiment. ...
The core argument of SIT is that individuals are unlikely to offer someone help unless they have received a specific request for such help. ...
Because the study model included two independent variables, one of which functions as a moderator, Hayes' PROCESS macro in SPSS was used for the moderated mediation analysis using a bootstrapping method ...
doi:10.1016/j.chb.2014.04.039
fatcat:ngnslken6ne45dqn3h67eyb5ry
IBM-ACS: Reminiscences and Lessons Learned from a 1960's Supercomputer Project
[chapter]
2011
Lecture Notes in Computer Science
This paper contains reminiscences of my work as a young engineer at IBM-Advanced Computing Systems. ...
of abstraction, about ranging widely across levels of abstraction when seeking innovative system optimizations, about principled versus ad-hoc design and the need for principled design of the design process ...
Mark's penetrating investigations provide amazing amounts of detail and are a tremendous resource for gaining understandings of project dynamics in earlier times. ...
doi:10.1007/978-3-642-24541-1_15
fatcat:khksvqpe7rc2tds34ly6r3j6fy
« Previous
Showing results 1 — 15 out of 95 results