A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Identifying Knots of Trust in Virtual Communities
[chapter]
2011
IFIP Advances in Information and Communication Technology
Knots of trust are groups of community members having overall "strong" trust relations between them. In previous work we introduced the knot aware trust based reputation model. ...
In the current paper we present the problem of identifying knots which is modeled as a graph clustering problem, where vertices correspond to individuals and edges describe trust relationships between ...
Applying Clustering for Identifying Knots A knot [12] is a subset of community members identified as having overall strong trust relations among them. ...
doi:10.1007/978-3-642-22200-9_8
fatcat:62scwci63nct3n7blyus2wgkgi
Trust and reputation in and across virtual communities
2013
Proceedings of the 16th International Conference on Extending Database Technology - EDBT '13
These systems accumulate information regarding activities of people or peers in general, to infer their reputation in some context or within a virtual community. ...
Among these models, we present our work on the knot model, which deals with communities of strangers. ...
We developed the Knot model for obtaining trust-based reputation in communities of strangers. The knot model identifies groups of trustees we call knots. ...
doi:10.1145/2452376.2452477
dblp:conf/edbt/Gal-OzG13
fatcat:trwmxr2d3veqbj3sdvpsnzcqay
Knots Maintenance for Optimal Management of Trust Relations
[chapter]
2014
IFIP Advances in Information and Communication Technology
The knot model is aimed at obtaining a trust-based reputation in communities of strangers. ...
The problem of identifying knots in a trust network is modeled as a graph clustering problem. ...
The knot-aware trust-based reputation model for virtual communities introduced by Gal-Oz et al. [2] refers to a community as a collection of knots (sub-communities). ...
doi:10.1007/978-3-662-43813-8_13
fatcat:yljuic7pbfh3fkxllewcuz5lxm
Methods for Computing Trust and Reputation While Preserving Privacy
[chapter]
2009
Lecture Notes in Computer Science
Trust and Reputation systems in distributed environments attain widespread interest as online communities are becoming an inherent part of the daily routine of Internet users. ...
Several models for trust based reputation have been suggested recently, among them the Knots model [5] . ...
The Knots Model The Knots model [5] is a TRS model for large-scale virtual communities. ...
doi:10.1007/978-3-642-03007-9_20
fatcat:dcnjb6b4dbds3hv5l6qdhimbia
Software protection for dynamically-generated code
2013
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on - PPREW '13
Process-level Virtual machines (PVMs) often play a crucial role in program protection. ...
Our scheme centers around the run-time creation of a network of software knots (an instruction sequence that checksums portions of the code) to detect tamper. ...
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ...
doi:10.1145/2430553.2430554
dblp:conf/popl/GhoshHD13
fatcat:pkmse5e6s5eqrcj5owlxizbf3y
Schemes for Privately Computing Trust and Reputation
[chapter]
2010
IFIP Advances in Information and Communication Technology
The Knots model provides a member of a community with a method to compute the reputation of other community members. ...
A discussion on privately computing trust in the Knots model appears in [16] . ...
The Knots model is a trust-based reputation model introduced in a previous work [8] for large-scale virtual communities. ...
doi:10.1007/978-3-642-13446-3_1
fatcat:3lzrhz652redxcgngib2vzcb6u
Sharing Reputation Across Virtual Communities
2010
Journal of Theoretical and Applied Electronic Commerce Research
Trust and reputation systems for virtual communities are gaining increasing research attention. ...
A number of papers on Trust and Reputation discuss aspects important for cross-community reputation. The problem of uncertainty and confidence in computing reputation is discussed in [12] , [20] . ...
We also thank Anat Sirpad and Michal Montal for assembling the hotels data from the different communities and Elena Churkin for implementing and executing the hotels experiment. ...
doi:10.4067/s0718-18762010000200002
fatcat:hdaukbmtunhj3fuopqpkbqxdb4
ViBR – Conceptualising a Virtual Big Room through the Framework of People, Processes and Technology
2015
Procedia Economics and Finance
, disparity in design iterations are eliminated, and trust is increased. ...
The "Big Room" in construction refers to a large facility supporting the colocation of the entire project team, where some of the critical problems such as delays in decision-making, problems in communication ...
A 'knot' represents a distributed collaborative expertise in pursuit of a common task in a design process. ...
doi:10.1016/s2212-5671(15)00216-6
fatcat:7gc5juiicveljdxyck3gipbjc4
Reputation - from Social Perception to Internet Security
[chapter]
2015
IFIP Advances in Information and Communication Technology
However, reputation plays also an important role in the internet society and enables us to establish trust which is essential for interaction in the virtual world. ...
Reputation is a concept that we use in many aspects of our social life and as part of our decision making process. ...
Our approach is based on a flow algorithm, commonly used for computing trust in social networks and virtual communities. ...
doi:10.1007/978-3-319-18491-3_1
fatcat:mws65mztyjcjhhhnvrff5mswxm
New Vision of Collaborative Networked Study: Fundamentals, Applications and Discipline Formation at CEFET/RJ
[chapter]
2009
IFIP Advances in Information and Communication Technology
Collaborative networks of organizations and/or can be nowadays found in large variety of forms, including virtual organizations, virtual enterprise, extended enterprise, dynamic supply chains, social network ...
In this context, the article presents the experience developed by Federal Center of Technological Education -CEFET/RJ Brazil that began, in the first semester of 2007, a pilot course on Collaborative Network ...
Introduction The "term" network is nowadays a central issue in many fields like; social sciences, communications, physics, computer science, virtual organization, virtual enterprise, etc. ...
doi:10.1007/978-3-642-04568-4_84
fatcat:ydhyvz3ixjee3nq7dbgywtqxoi
A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade
[chapter]
2012
IFIP Advances in Information and Communication Technology
This combination offers an excellent pretext for a review of how we got here: the evolution of the international research community on trust management from 2002 to 2012. ...
Since that era, I have spent the last decade with the international research community on Trust Management serving in various facilitator and leadership roles. ...
Social aspects and usability: such as "The Evolution of Trust" by Pam Briggs,
"Why We Need More Effective Trust Signaling" by Angela Sasse, and "Identify-
ing Knots of Trust in Virtual Communities ...
doi:10.1007/978-3-642-29852-3_24
fatcat:m7rz6g2grnfcxj4zcjvk2jpo2a
Privacy issues with sharing reputation across virtual communities
2011
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society - PAIS '11
Disclosing a piece of reputation-related information in one community may cause privacy loss in another community and vice versa. ...
Members of a community are dealing with the daily conflict of having to decide what information they are willing to disclose in order to increase their reputation. ...
Information sharing is a key objective in the age of Internet and virtual communities. ...
doi:10.1145/1971690.1971693
dblp:conf/edbt/Gal-OzGG11
fatcat:6eh5um7t6fbb7jh6mqvowfrwiy
Lecturers' Role in Tutor Development from an Activity Theory Perspective
2014
Mediterranean Journal of Social Sciences
Knots were tied, untied and sometimes retied as the tutoring community worked together to achieve the object, which was the development of tutors. ...
Social interactions in tutoring, particularly from the perspective of tutor-lecturer interactions, remain largely unexplored. ...
Another knot was tied when the lecturer and tutor kept in contact via email communication. ...
doi:10.5901/mjss.2014.v5n15p391
fatcat:c2w22qurj5gahhzmjncf5iz2ky
The laparoscopic suture trainer for home – From reality to virtual and back again
2013
International Journal of Surgery
An educational poster was created showing the results of the audit, and detailing how accuracy could be improved. Posters were placed in communal nursing areas. ...
A random sample of 20 nurses, were asked to record the volumes in each of the bottles as per their normal practice. ...
Lancashire Teaching Hospital NHS Trust, Preston, UK. Introduction: The 2009 GMC document 'Tomorrow's Doctors' identified the standards expected of Newly Qualified Doctors (NQDs). ...
doi:10.1016/j.ijsu.2013.06.543
fatcat:k7bztpbpy5call64w6zqqzgzqy
Virtual Micro-Politics: Informal Tactics of Influence and Power in Inter-Organizational Networks
2010
2010 43rd Hawaii International Conference on System Sciences
Furthermore, we identified additional micro-political tactics specific to virtual networks. The latter are especially related to the use of ICT. ...
By means of a qualitative interview study we investigated structures and strategies of power within virtual networks. ...
Potential for Innovation in a Modern Working Environment" under grant no. 01FM07047. ...
doi:10.1109/hicss.2010.436
dblp:conf/hicss/JanneckS10
fatcat:khffqxhw7vcftegtvussjyq3si
« Previous
Showing results 1 — 15 out of 6,112 results