BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
trust
Google trust

Tag #trust

229 papers:

DiGRADiGRA-2019-Fleet #bound
Boundaries, Trust and Reputation in Virtual and Illicit Markets (RF).
KDDKDD-2019-ZouZCW0 #optimisation #policy
Separated Trust Regions Policy Optimization Method (LZ, ZZ, YC, XW, WZ0), pp. 1471–1479.
ICMLICML-2018-DunnerLGBHJ #algorithm #distributed #higher-order
A Distributed Second-Order Algorithm You Can Trust (CD, AL, MG, AB, TH, MJ), pp. 1357–1365.
MSRMSR-2017-ZolfaghariniaAG #empirical
Do not trust build results at face value: an empirical study of 30 million CPAN builds (MZ, BA, YGG), pp. 312–322.
ICMLICML-2017-HonerNBMG #detection #robust
Minimizing Trust Leaks for Robust Sybil Detection (JH, SN, AB0, KRM, NG), pp. 1520–1528.
CASECASE-2017-WuXS #network #protocol
Trust-based protocol for securing routing in opportunistic networks (XW, JX, JS), pp. 434–439.
CHI-PLAYCHI-PLAY-2016-DeppingMJBT #game studies #social
Trust Me: Social Games are Better than Social Icebreakers at Building Trust (AED, RLM, CJ, JTB, SCT), pp. 116–129.
CIKMCIKM-2016-JangFKKH #information management #named #performance
PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information (MHJ, CF, SWK, UK, JH), pp. 629–638.
KDDKDD-2016-Ribeiro0G #classification #predict #quote #why
“Why Should I Trust You?”: Explaining the Predictions of Any Classifier (MTR, SS0, CG), pp. 1135–1144.
CASECASE-2016-RahmanWWMPR #assembly #collaboration #flexibility
Trust-based compliant robot-human handovers of payloads in collaborative assembly in flexible manufacturing (SMMR, YW, IDW, LM, RP, SR), pp. 355–360.
VLDBVLDB-2015-DongGMDHLSZ #knowledge-based #web
Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources (XLD, EG, KM, VD, WH, CL, SS, WZ), pp. 938–949.
FDGFDG-2015-JohanssonVK #game studies #multi #online
I am being watched by the Tribunal: Trust and control in Multiplayer Online Battle Arena games (MJ, HV, YK).
CHICHI-2015-HardingKDR #human-computer
HCI, Civic Engagement & Trust (MH, BK, ND, MR), pp. 2833–2842.
CSCWCSCW-2015-KnowlesRHDBHWW #modelling
Models and Patterns of Trust (BK, MR, MH, ND, LB, JH, JW, DW), pp. 328–338.
HCIHCI-DE-2015-SalanitriHBLSW #usability
Relationship Between Trust and Usability in Virtual Environments: An Ongoing Study (DS, CH, SB, GL, SS, BW), pp. 49–59.
HCIHCI-IT-2015-KhataeiA #persuasion
Trust-Based Individualization for Persuasive Presentation Builder (AK, AA), pp. 418–428.
ICMLICML-2015-SchulmanLAJM #optimisation #policy
Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
KDDKDD-2015-Dhar #question
Should You Trust Your Money to a Robot? (VD), p. 1625.
RecSysRecSys-2015-ForsatiBMER #algorithm #named #performance #recommendation
PushTrust: An Efficient Recommendation Algorithm by Leveraging Trust and Distrust Relations (RF, IB, FM, AHE, HR), pp. 51–58.
ECOOPECOOP-2015-VekrisCJ #type system #verification
Trust, but Verify: Two-Phase Typing for Dynamic Languages (PV, BC, RJ), pp. 52–75.
ICSEICSE-v2-2015-EtienneMAD #modelling #performance #predict #process #proving
Improving Predictability, Efficiency and Trust of Model-Based Proof Activity (JFÉ, MM, FA, VD), pp. 139–148.
SACSAC-2015-GkorouPE #distributed #network
Trust-based collection of information in distributed reputation networks (DG, JAP, DHJE), pp. 2312–2319.
SACSAC-2015-SharmaMDH
Bi-directional trust index computation in resource marketplace (AS, TM, PD, VGH), pp. 2305–2311.
CGOCGO-2015-RohouSS #branch #performance #predict
Branch prediction and the performance of interpreters: don’t trust folklore (ER, BNS, AS), pp. 103–114.
DACDAC-2015-BrasserMSWK #named
TyTAN: tiny trust anchor for tiny devices (FFB, BEM, ARS, CW, PK), p. 6.
QoSAQoSA-2014-Meyer #question #verification
Trust or verify? (BM), pp. 1–2.
HTHT-2014-TangHL #social #social media
Is distrust the negation of trust?: the value of distrust in social media (JT, XH, HL), pp. 148–157.
CHICHI-2014-GarbettCEGO #interface #people
Finding “real people”: trust and diversity in the interface between professional and citizen journalists (ATG, RC, PE, MG, PO), pp. 3015–3024.
CHICHI-2014-PanSS #interactive
Comparing flat and spherical displays in a trust scenario in avatar-mediated interaction (YP, WS, AS), pp. 1397–1406.
HCIHCI-AS-2014-NiedoberHMKSCJL #automation #case study
Influence of Cultural, Organizational and Automation Factors on Human-Automation Trust: A Case Study of Auto-GCAS Engineers and Developmental History (DJN, NTH, GM, KK, MS, AC, WJ, JBL), pp. 473–484.
HCIHCI-AS-2014-TsengT #complexity #correlation #design #online #visual notation
The Correlation between Visual Complexity and User Trust in On-line Shopping: Implications for Design (KTT, YCT), pp. 90–99.
HCILCT-NLE-2014-SousaLD #human-computer #towards
A Model for Human-Computer Trust — Contributions Towards Leveraging User Engagement (SCS, DRL, PD), pp. 128–137.
HCILCT-TRE-2014-BaldiniKLT #network #social
European Citizens and Their Trust in Social Networks (GB, IK, JL, MT), pp. 363–374.
HCISCSM-2014-LeonardoFGPSSUWC #identification #social #social media
Identifying Locations of Social Significance: Aggregating Social Media Content to Create a New Trust Model for Exploring Crowd Sourced Data and Information (ADL, SF, AG, FP, WS, TS, AU, DW, JBC), pp. 170–177.
CAiSECAiSE-2014-MoyanoBG
Trust-Aware Decision-Making Methodology for Cloud Sourcing (FM, KB, MCFG), pp. 136–149.
ICEISICEIS-v2-2014-CalefatoLN #social #social media
Investigating the Effect of Social Media on Trust Building in Customer-supplier Relationships (FC, FL, NN), pp. 635–642.
CIKMCIKM-2014-MaLG #collaboration #community #recommendation
Improving Recommendation Accuracy by Combining Trust Communities and Collaborative Filtering (XM, HL, ZG), pp. 1951–1954.
RecSysRecSys-2014-FazeliLBDS #matrix #social
Implicit vs. explicit trust in social matrix factorization (SF, BL, AB, HD, PBS), pp. 317–320.
RecSysRecSys-2014-HarmanOAG #recommendation
Dynamics of human trust in recommender systems (JLH, JO, TFA, CG), pp. 305–308.
SIGIRSIGIR-2014-YaoHHZ #modelling #recommendation
Modeling dual role preferences for trust-aware recommendation (WY, JH, GH, YZ), pp. 975–978.
SACSAC-2014-GuoZTBY #empirical #recommendation
From ratings to trust: an empirical study of implicit trust in recommender systems (GG, JZ, DT, AB, NYS), pp. 248–253.
DATEDATE-2014-Jin #evaluation #proving #security #tool support
EDA tools trust evaluation through security property proofs (YJ), pp. 1–4.
DATEDATE-2014-JinS #evaluation #realtime
Real-time trust evaluation in integrated circuits (YJ, DS), pp. 1–6.
TACASTACAS-2014-HuthK #automation #named #reasoning
PEALT: An Automated Reasoning Tool for Numerical Aggregation of Trust Evidence (MH, JHPK), pp. 109–123.
CHICHI-2013-RaeTM #case study #communication #experience
In-body experiences: embodiment, control, and trust in robot-mediated communication (IR, LT, BM), pp. 1921–1930.
CSCWCSCW-2013-Al-AniBWTKMRP #developer #distributed #process
Globally distributed system developers: their trust expectations and processes (BAA, MJB, YW, ET, BK, SM, DFR, RP), pp. 563–574.
CSCWCSCW-2013-RollandL #collaboration #reliability #research #reuse
Beyond trust and reliability: reusing data in collaborative cancer epidemiology research (BR, CPL), pp. 435–444.
CSCWCSCW-2013-WangM #online #social #social media
Trust in online news: comparing social media and official media use by chinese citizens (YW, GM), pp. 599–610.
HCIDUXU-NTE-2013-JaimesMR #tool support
Increasing Trust in Personal Informatics Tools (LGJ, TM, AR), pp. 520–529.
HCIHCI-UC-2013-BeldadS #experience #ll #online
It Was Nice with the Brick So Now I’ll Click: The Effects of Offline and Online Experience, Perceived Benefits, and Trust on Dutch Consumers’ Online Repeat Purchase Intention (AB, MS), pp. 371–380.
HCIHCI-UC-2013-HayashiKO #empirical #network #social
An Empirical Investigation of Similarity-Driven Trust Dynamics in a Social Network (YH, VVK, HO), pp. 20–28.
HCIHCI-UC-2013-HeupelBK #privacy
Trust and Privacy in the di.me Userware (MH, MB, DK), pp. 39–48.
HCIHCI-UC-2013-NothdurftHM #human-computer
The Impact of Explanation Dialogues on Human-Computer Trust (FN, TH, WM), pp. 59–67.
HCIHIMI-HSM-2013-HighamVMSB #automation
Training Air Traffic Controller Trust in Automation within a NextGen Environment (TMH, KPLV, JM, TZS, VB), pp. 76–84.
EDOCEDOC-2013-GallegeGHR #contract #monitoring #using
Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
RecSysRecSys-2013-Guo #recommendation #similarity
Integrating trust and similarity to ameliorate the data sparsity and cold start for recommender systems (GG), pp. 451–454.
SEKESEKE-2013-WangWTZ #evaluation #named #network #recommendation
STERS: A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network (YW, JW, YT, JZ), pp. 322–325.
SACSAC-2013-AhmedE #network
Discovering influential nodes from trust network (SA, CIE), pp. 121–128.
SACSAC-2013-ChoCC #ad hoc #mobile #network
Composite trust-based public key management in mobile ad hoc networks (JHC, KSC, IRC), pp. 1949–1956.
SACSAC-2013-HabibVM #framework
A framework for evaluating trust of service providers in cloud marketplaces (SMH, VV, MM), pp. 1963–1965.
DACDAC-2013-ZhangYWSX #hardware #named #verification
VeriTrust: verification for hardware trust (JZ, FY, LW, ZS, QX), p. 8.
HTHT-2012-ShenSNT #network #online #social
Maximizing circle of trust in online social networks (YS, YSS, DTN, MTT), pp. 155–164.
CHICHI-2012-ChuangRMH #analysis #design #modelling #visualisation
Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
CHICHI-2012-FisherPDs #dataset #incremental #performance #scalability #visualisation
Trust me, I’m partially right: incremental visualization lets analysts explore large datasets faster (DF, IOP, SMD, MMCS), pp. 1673–1682.
CSCWCSCW-2012-VinesDBLMO
The joy of cheques: trust, paper and eighty somethings (JV, PD, MB, SL, AM, PO), pp. 147–156.
CIKMCIKM-2012-DuttingHW #recommendation
Maximizing revenue from strategic recommendations under decaying trust (PD, MH, IW), pp. 2283–2286.
CIKMCIKM-2012-HuangNHT #network #predict #social
Trust prediction via aggregating heterogeneous social networks (JH, FN, HH, YCT), pp. 1774–1778.
KDDKDD-2012-TangLGS #comprehension #evolution #named #online
eTrust: understanding trust evolution in an online world (JT, HG, HL, ADS), pp. 253–261.
KMISKMIS-2012-Kutay #information management #online
Trust Online for Information Sharing (CK), pp. 216–222.
SEKESEKE-2012-HumayunG #empirical #using
An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
SIGIRSIGIR-2012-Khatiban #mining #using
Building reputation and trust using federated search and opinion mining (SK), p. 994.
SACSAC-2012-NoorianFM
Preference-oriented QoS-based service discovery with dynamic trust and reputation management (ZN, MF, SM), pp. 2014–2021.
SACSAC-2012-YaichBJP #adaptation #community
An adaptive and Socially-Compliant Trust Management System for virtual communities (RY, OB, PJ, GP), pp. 2022–2028.
SACSAC-2012-ZhangI #protocol #web #web service #xml
An XML-based protocol for improving trust negotiation between Web Services (YZ, TI), pp. 1947–1954.
DATEDATE-2012-JinMM #encryption #evaluation
Post-deployment trust evaluation in wireless cryptographic ICs (YJ, DM, YM), pp. 965–970.
TACASTACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #validation
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
SIGITESIGITE-2011-LevySB #privacy
A trust-aware tag-based privacy control for eHealth 2.0 (KL, BS, YB), pp. 251–256.
ICPCICPC-2011-Ali #analysis #automation #named #retrieval
Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
ICPCICPC-2011-AliGA #requirements #traceability
Trust-Based Requirements Traceability (NA, YGG, GA), pp. 111–120.
MSRMSR-2011-SinhaMS #developer #open source
Entering the circle of trust: developer initiation as committers in open-source projects (VSS, SM, SS), pp. 133–142.
SFMSFM-2011-CostaIMMS #security
Security and Trust (GC, VI, FM, IM, RS), pp. 393–416.
CSCWCSCW-2011-SemaanM
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment (BS, GM), pp. 255–264.
HCIIDGD-2011-ZhangM
Once Broken, Never Fixed? The Impact of Culture and Medium on Repairing Trust in CMC (QZ, NM), pp. 341–350.
EDOCEDOC-2011-FatemiSW
Trust and Business Webs (HF, MvS, RW), pp. 119–128.
ICEISICEIS-J-2011-Shen #comparison #comprehension #social
Understanding User’s Acceptance of Social Shopping Websites: Effects of Social Comparison and Trust (JS), pp. 365–373.
ICEISICEIS-v3-2011-ViriyasitavatM #formal method #requirements #specification #workflow
Formalizing Trust Requirements and Specification in Service Workflow Environments (WV, AM), pp. 196–206.
ICEISICEIS-v4-2011-HuGK #evaluation #modelling #network
Supply Chain Trust Evaluation Model based on Bayesian Network (XH, FG, YK), pp. 712–715.
ICEISICEIS-v4-2011-ShenE #comparison #social
User Acceptance of Social Shopping Sites — Social Comparison and Trust (JS, LBE), pp. 219–224.
CIKMCIKM-2011-Fernandez-LuqueKM #named #retrieval
HealthTrust: trust-based retrieval of you tube’s diabetes channels (LFL, RK, GBM), pp. 1917–1920.
CIKMCIKM-2011-LoSZL #community #mining #network
Mining direct antagonistic communities in explicit trust networks (DL, DS, KZ, EPL), pp. 1013–1018.
ECIRECIR-2011-ShiLH11a #how #question #recommendation
How Far Are We in Trust-Aware Recommendation? (YS, ML, AH), pp. 704–707.
KDDKDD-2011-VydiswaranZR #framework
Content-driven trust propagation framework (VGVV, CZ, DR), pp. 974–982.
RecSysRecSys-2011-GorgoglionePT #behaviour #recommendation
The effect of context-aware recommendations on customer purchasing behavior and trust (MG, UP, AT), pp. 85–92.
ICSEICSE-2011-MeneelyW #developer #metric #network #question
Socio-technical developer networks: should we trust our measurements? (AM, LW), pp. 281–290.
SACSAC-2011-BaoCCC #network
Hierarchical trust management for wireless sensor networks and its application to trust-based routing (FB, IRC, MC, JHC), pp. 1732–1738.
SACSAC-2011-SchryenVRH #approach #distributed #formal method #towards
A formal approach towards measuring trust in distributed systems (GS, MV, SR, SMH), pp. 1739–1745.
SIGMODSIGMOD-2010-GatterbauerS #using
Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
CHICHI-2010-CramerESGW #mobile #social
Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
KDDKDD-2010-ChuaL #generative #modelling #network #online #rating #using
Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
KMISKMIS-2010-FaedAW
The Impact of Trust and Interactivity on Intensifying Customer Loyalty for CRM (AF, AA, CW), pp. 113–120.
RecSysRecSys-2010-JamaliE #matrix #network #recommendation #social
A matrix factorization technique with trust propagation for recommendation in social networks (MJ, ME), pp. 135–142.
SACSAC-2010-DolevGK #multi #scalability
Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time (SD, NG, MK), pp. 1460–1465.
SACSAC-2010-OCallaghanDC #grid
Evaluating trust in grid certificates (DO, LD, BAC), pp. 1449–1450.
SACSAC-2010-SaadiPB #2d #named
T2D: a peer to peer trust management system based on disposition to trust (RS, JMP, LB), pp. 1472–1478.
SACSAC-2010-YadavS #framework #named #network
iTrust: an integrated trust framework for wireless sensor networks (KY, AS), pp. 1466–1471.
HPDCHPDC-2010-GehaniK #multi #named #verification
Mendel: efficiently verifying the lineage of data modified in multiple trust domains (AG, MK), pp. 227–239.
OSDIOSDI-2010-MahajanSLCADW #named
Depot: Cloud Storage with Minimal Trust (PM, STVS, SL, AC, LA, MD, MW), pp. 307–322.
OSDIOSDI-2010-TangMK #operating system
Trust and Protection in the Illinois Browser Operating System (ST, HM, STK), pp. 17–32.
CHICHI-2009-CramerESW #adaptation #interactive
Awareness, training and trust in interaction with adaptive spam filters (HSMC, VE, MvS, BJW), pp. 909–912.
CHICHI-2009-KostakosO #assessment #design
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust (VK, IO), pp. 329–332.
CHICHI-2009-ScissorsGGG #similarity
In CMC we trust: the role of similarity (LES, AJG, KG, DG), pp. 527–536.
HCIHCI-AUII-2009-DetweilerB #guidelines #online #towards
Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory (CD, JB), pp. 605–614.
HCIOCSC-2009-Jameson #community #distributed #online
Distributed Leadership, Trust and Online Communities (JJ), pp. 226–235.
ICEISICEIS-DISI-2009-CastilloCGPPV #network #quality
Establishing Trust Networks based on Data Quality Criteria for Selecting Data Suppliers (RPC, IC, IGRdG, MP, MP, EV), pp. 37–42.
ICEISICEIS-SAIC-2009-PetersA #analysis #on the #platform
On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
CIKMCIKM-2009-LiuDRL #named #personalisation
StereoTrust: a group based personalized trust model (XL, AD, KR, EPL), pp. 7–16.
CIKMCIKM-2009-SunWL #injection
Injecting purpose and trust into data anonymisation (XS, HW, JL), pp. 1541–1544.
ICMLICML-2009-RaykarYZJFVBM #learning #multi
Supervised learning from multiple experts: whom to trust when everyone lies a bit (VCR, SY, LHZ, AKJ, CF, GHV, LB, LM), pp. 889–896.
KDDKDD-2009-JamaliE #named #random #recommendation
TrustWalker: a random walk model for combining trust-based and item-based recommendation (MJ, ME), pp. 397–406.
KMISKMIS-2009-SadaranganiA
The Role of Trust in Impact of Leadership on Knowledge Sharing (PS, AA), pp. 266–270.
RecSysRecSys-2009-Golbeck #recommendation #social #tutorial #using
Tutorial on using social trust for recommender systems (JG), pp. 425–426.
RecSysRecSys-2009-JamaliE #network #recommendation #using
Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
RecSysRecSys-2009-MaLK #learning #recommendation
Learning to recommend with trust and distrust relationships (HM, MRL, IK), pp. 189–196.
RecSysRecSys-2009-MoghaddamJEH #feedback #named #recommendation #using
FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
RecSysRecSys-2009-Tavakolifard
Situation-aware trust management (MT), pp. 413–416.
RecSysRecSys-2009-WalterBS #network #personalisation #social
Personalised and dynamic trust in social networks (FEW, SB, FS), pp. 197–204.
SIGIRSIGIR-2009-MaKL #learning #recommendation #social
Learning to recommend with social trust ensemble (HM, IK, MRL), pp. 203–210.
RERE-2009-ElahiY #analysis #requirements #security #trade-off
Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
SACSAC-2009-AhamedKHZ #security #towards
Towards developing a trust-based security solution (SIA, DK, CSH, MZ), pp. 2204–2205.
SACSAC-2009-Huynh #assessment #framework #personalisation
A personalized framework for trust assessment (TDH), pp. 1302–1307.
SACSAC-2009-PengC #collaboration #multi #named #recommendation
iTrustU: a blog recommender system based on multi-faceted trust and collaborative filtering (TCP, ScTC), pp. 1278–1285.
SACSAC-2009-Ries #modelling #representation
Extending Bayesian trust models regarding context-dependence and user friendly representation (SR), pp. 1294–1301.
SACSAC-2009-UddinZ #algorithm #automation #monitoring #named
ATM: an automatic trust monitoring algorithm for service software (MGU, MZ), pp. 1040–1044.
SACSAC-2009-YangSKY #collaboration #modelling #online
Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
JCDLJCDL-2008-CaverleeLW #community #named #online
Socialtrust: tamper-resilient trust establishment in online communities (JC, LL, SW), pp. 104–114.
CHICHI-2008-Kindberg
Measuring trust in wi-fi hotspots (TK), pp. 173–182.
CSCWCSCW-2008-KitturSC #wiki
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia (AK, BS, EHC), pp. 477–480.
CSCWCSCW-2008-ScissorsGG
Linguistic mimicry and trust in text-based CMC (LES, AJG, DG), pp. 277–280.
ICEISICEIS-AIDSS-2008-Portillo-RodriguezSVP #community
A Model to Rate Trust in Communities of Practice (JPR, JPS, AV, MP), pp. 193–198.
ICEISICEIS-HCI-2008-IbrahimNM #web
Wisdom on the Web: On Trust, Institution and Symbolisms — A Preliminary Investigation (ENMI, NLMN, SM), pp. 13–20.
ICEISICEIS-SAIC-2008-BninaCNA #question #what
What Can Context Do for Trust in Manets? (EBB, OC, CTN, HKBA), pp. 133–141.
ICEISICEIS-SAIC-2008-PetersDW #e-commerce
Consumer-to-Consumer Trust in E-Commerce — Are there Rules for Writing Helpful Product Reviews (GP, MD, RW), pp. 61–66.
CIKMCIKM-2008-KazaiM #information retrieval #social
Trust, authority and popularity in social information retrieval (GK, NMF), pp. 1503–1504.
RecSysRecSys-2008-Lee #named #recommendation
PITTCULT: trust-based cultural event recommender (DHL), pp. 311–314.
SEKESEKE-2008-YangE #delivery #multi
Integrating Trust Management into Usage Control in P2P Multimedia Delivery (LY, RKE), pp. 411–416.
SACSAC-2008-AdnaneSBM #behaviour #detection #reasoning
Autonomic trust reasoning enables misbehavior detection in OLSR (AA, RTdSJ, CB, LM), pp. 2006–2013.
SACSAC-2008-AhamedHT #pervasive
Service sharing with trust in pervasive environment: now it’s time to break the jinx (SIA, MMH, NT), pp. 1622–1628.
SACSAC-2008-BistarelliS #multi #network
Propagating multitrust within trust networks (SB, FS), pp. 1990–1994.
SACSAC-2008-Nassiri #3d #e-commerce #using
Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
SACSAC-2008-UddinZ #named #towards
UMLtrust: towards developing trust-aware software (MGU, MZ), pp. 831–836.
SACSAC-2008-UddinZA #named
CAT: a context-aware trust model for open and dynamic systems (MGU, MZ, SIA), pp. 2024–2029.
SACSAC-2008-VictorCTC #recommendation
Whom should I trust?: the impact of key figures on cold start recommendations (PV, CC, AT, MDC), pp. 2014–2018.
PDPPDP-2008-CeccatoNT #performance #verification
Distributing Trust Verification to Increase Application Performance (MC, JN, PT), pp. 604–610.
ESOPESOP-2008-CirilloJPR #distributed #named
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (AC, RJ, CP, JR), pp. 208–223.
ICLPICLP-2008-BonattiCOS #privacy #security
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
TPDLECDL-2007-WallisBMPRH #library #quality
Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries (JCW, CLB, MSM, AP, NR, MHH), pp. 380–391.
HTHT-2007-MoganW #case study #information management
A study into user perceptions of information sharing and trust in virtual teams (SM, WW), pp. 43–44.
CHICHI-2007-NguyenC #multi #named #video
Multiview: improving trust in group video conferencing through spatial faithfulness (DTN, JC), pp. 1465–1474.
HCIHCI-AS-2007-LowryRH
First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites (PBL, TLR, TH), pp. 77–85.
HCIHIMI-IIE-2007-IbrahimNM #concept #framework #online #web
“Seeing Is Not Believing But Interpreting”, Inducing Trust Through Institutional Symbolism: A Conceptual Framework for Online Trust Building in a Web Mediated Information Environment (ENMI, NLMN, SM), pp. 64–73.
HCIOCSC-2007-XiongYZYL #grid #peer-to-peer
A Trust-Based Reputation System in Peer-to-Peer Grid (ZX, YY, XZ, DY, LL), pp. 228–235.
ICEISICEIS-EIS-2007-JoyceW
Building, and Losing, Consumer Trust in B2C E-Business (PJ, GW), pp. 55–62.
ICEISICEIS-EIS-2007-SchmidtDSC #ontology
Trust and Reputation Ontologies for Electronic Business (SS, TSD, RS, EC), pp. 308–315.
ECIRECIR-2007-BriggsS #social
Harnessing Trust in Social Search (PB, BS), pp. 525–532.
ICMLICML-2007-LinWK #scalability
Trust region Newton methods for large-scale logistic regression (CJL, RCW, SSK), pp. 561–568.
RecSysRecSys-2007-MassaA #recommendation
Trust-aware recommender systems (PM, PA), pp. 17–24.
SEKESEKE-2007-PatelXG #online #realtime
Real-Time Trust Management in Agent Based Online Auction Systems (RP, HX, AG), pp. 244–250.
SIGIRSIGIR-2007-NieWD #web
Winnowing wheat from the chaff: propagating trust to sift spam from the web (LN, BW, BDD), pp. 869–870.
PPDPPPDP-2007-HristovaTL #analysis #performance #policy
Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
SACSAC-2007-BillhardtHOC
Trust-based service provider selection in open environments (HB, RH, SO, RC), pp. 1375–1380.
SACSAC-2007-NakamuraM #design #linux
Designing a trust chain for a thin client on a live Linux cd (MN, SM), pp. 1605–1606.
SACSAC-2007-Ries
Certain trust: a trust model for users and agents (SR), pp. 1599–1604.
DATEDATE-2007-Casale-RossiSADGMPS #named #product line #question
DFM/DFY: should you trust the surgeon or the family doctor? (MCR, AJS, RCA, AD, CG, PM, DP, JS), pp. 439–442.
DATEDATE-2007-VerbauwhedeS #design #security
Design methods for security and trust (IV, PS), pp. 672–677.
DATEDATE-2007-WagnerB #semantics
Engineering trust with semantic guardians (IW, VB), pp. 743–748.
ICLPICLP-2007-CzenkoE #logic programming
Core TuLiP Logic Programming for Trust Management (MC, SE), pp. 380–394.
FLOPSFLOPS-2006-PimlottK
Soutei, a Logic-Based Trust-Management System (AP, OK), pp. 130–145.
CAiSECAiSE-2006-Kritis
Dealing with Trust in eGov Services (VK), pp. 18–19.
CAiSECAiSE-2006-Sutcliffe #concept #design #modelling #named
Trust: From Cognition to Conceptual Models and Design (AGS), pp. 3–17.
PPDPPPDP-2006-GorlaHS
Inferring dynamic credentials for rôle-based trust management (DG, MH, VS), pp. 213–224.
ICSEICSE-2006-NguyenBV #maintenance #outsourcing
Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
ICSEICSE-2006-SuryanarayanaDET #architecture #distributed #modelling
Architectural support for trust models in decentralized applications (GS, MHD, JRE, RNT), pp. 52–61.
SACSAC-2006-KotsovinosW #named #scalability
BambooTrust: practical scalable trust management for global public computing (EK, AW), pp. 1893–1897.
SACSAC-2006-QuerciaLHCB #named
STRUDEL: supporting trust in the dynamic establishment of peering coalitions (DQ, ML, SH, LC, SB), pp. 1870–1874.
SACSAC-2006-WengMG #collaboration #metric
Improving collaborative filtering with trust-based metrics (JW, CM, AG), pp. 1860–1864.
SACSAC-2006-ZuoP #evaluation
Information trustworthiness evaluation based on trust combination (YZ, BP), pp. 1880–1885.
OSDIOSDI-2006-Ta-MinLL #configuration management #interface #operating system
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable (RTM, LL, DL), pp. 279–292.
TACASTACAS-2006-JhaSWR #automaton
Weighted Pushdown Systems and Trust-Management Systems (SJ, SS, HW, TWR), pp. 1–26.
SIGMODSIGMOD-2005-ChaudhuriKR #query #question #sql
When Can We Trust Progress Estimators for SQL Queries? (SC, RK, RR), pp. 575–586.
ICEISICEIS-v3-2005-ZhaoVB #collaboration #distributed #interactive
Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments (WZ, VV, GB), pp. 331–336.
CIKMCIKM-2005-WengMGL #collaboration
Trust-based collaborative filtering (JW, CM, AG, DL), pp. 299–300.
SACSAC-2005-BicakciCT #certification #how #metric
How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
SACSAC-2005-WieringaG #coordination #correctness #design #process
Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
SACSAC-2005-ZuoP #component
Component based trust management in the context of a virtual organization (YZ, BP), pp. 1582–1588.
PPoPPPPoPP-2005-YangBHM #correctness #monitoring #source code #verification
Trust but verify: monitoring remotely executing programs for progress and correctness (SY, ARB, YCH, SPM), pp. 196–205.
WICSAWICSA-2004-SuryanarayanaEHT #architecture #distributed #named
PACE: An Architectural Style for Trust Management in Decentralized Applications (GS, JRE, SAH, RNT), pp. 221–232.
VLDBVLDB-2004-SkogsrudBCD #lightweight #named
Trust-Serv: A Lightweight Trust Negotiation Service (HS, BB, FC, MQD), pp. 1329–1332.
CHICHI-2004-SillenceBFH #health #online
Trust and mistrust of online health sites (ES, PB, LF, PRH), pp. 663–670.
RERE-2004-HaleyLMN #requirements #security
The Effect of Trust Assumptions on the Elaboration of Security Requirements (CBH, RCL, JDM, BN), pp. 102–111.
FSEFSE-2004-Capra #mobile
Engineering human trust in mobile system collaborations (LC), pp. 107–116.
SACSAC-2004-SeigneurJ #privacy #ubiquitous
Trust enhanced ubiquitous payment without too much privacy loss (JMS, CDJ), pp. 1593–1599.
ESOPESOP-2004-GuttmanTCHRS
Trust Management in Strand Spaces: A Rely-Guarantee Method (JDG, FJT, JAC, JCH, JDR, BTS), pp. 325–339.
VMCAIVMCAI-2004-Guttman #protocol #security
Security, Protocols, and Trust (JDG), p. 1.
SEFMSEFM-2003-CarboneNS #formal method #network
A Formal Model for Trust in Dynamic Networks (MC, MN, VS), p. 54–?.
CHICHI-2003-RiegelsbergerSM #e-commerce #people
Shiny happy people building trust?: photos on e-commerce websites and consumer trust (JR, MAS, JDM), pp. 121–128.
ICEISICEIS-v1-2003-LocMP #approach #component
Try and Patch: An Approach to Improve the Trust in Software Components (PTXL, PM, GP), pp. 505–508.
ICEISICEIS-v4-2003-PerkinsJBC #collaboration #information management
Building Supply Chain Relationships with Knowledge Management: Engineering Trust in Collaborative Systems (JP, AKJ, LB, SC), pp. 63–70.
ICEISICEIS-v4-2003-Vasiu #security #web #web service
Security Web Services Based on Trust (LV), pp. 369–376.
PADLPADL-2003-LiM #constraints #datalog
DATALOG with Constraints: A Foundation for Trust Management Languages (NL, JCM), pp. 58–73.
PPDPPPDP-2003-NielsenK #towards
Towards a formal notion of trust (MN, KK), pp. 4–7.
SACSAC-2003-CazierSL #privacy
Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
JCDLJCDL-2002-House #community
Trust and epistemic communities in biodiversity data sharing (NAVH), pp. 231–239.
CHICHI-2002-BosOGOW #development
Effects of four computer-mediated communications channels on trust development (NB, JSO, DG, GMO, ZW), pp. 135–140.
CHICHI-2002-ZhengVBOO #process #social
Trust without touch: jumpstarting long-distance trust with initial social activities (JZ, ESV, NB, JSO, GMO), pp. 141–146.
CBSECBSE-2001-Voas #certification #component
Component Trust and Certification (JV), p. 1.
CSEETCSEET-2001-DuleyMV #industrial
Teamwork and Trust: Universities, industry and the professional software engineer (RD, SPM, DV), pp. 153–161.
CHICHI-2001-BickmoreC #implementation #relational
Relational agents: a model and implementation of building user trust (TWB, JC), pp. 396–403.
ICEISICEIS-v2-2001-GochenouerT #internet #privacy
Privacy Audits and Trust: The Internet Dilemma (JEG, MLT), pp. 905–909.
CIKMCIKM-2001-AbererD #information management
Managing Trust in a Peer-2-Peer Information System (KA, ZD), pp. 310–317.
PPDPPPDP-2001-HepburnW #π-calculus
Trust in the π-Calculus (MH, DW), pp. 103–114.
RERE-2001-GansJKLEFM #approach #modelling #network #requirements
Requirements Modeling for Organization Networks: A (Dis-)Trust-Based Approach (GG, MJ, SK, GL, LE, CF, MM), pp. 154–165.
CSCWCSCW-2000-GreenspanGWB #communication
Interpersonal trust and common ground in electronically mediated communication (SG, DG, DMW, AB), pp. 251–260.
ICSEICSE-2000-HeinemanCFMSS #component #re-engineering
Component-based software engineering and the issue of trust (GTH, WTC, JSF, AM, JRS, MS), pp. 661–664.
TOOLSTOOLS-USA-1999-CrichtonDW #data access #mobile
When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
POPLPOPL-1999-RielyH #mobile #type system
Trust and Partial Typing in Open Systems of Mobile Agents (JR, MH), pp. 93–104.
CHICHI-1998-Rocco
Trust Breaks Down in Electronic Contexts But Can Be Repaired by Some Initial Face-to-Face Contact (ER), pp. 496–502.
CSCWCSCW-1998-HouseBS #information management #set
Cooperative Knowledge Work and Practices of Trust: Sharing Environmental Planning Data Sets (NAVH, MHB, LRS), pp. 335–343.
SASSAS-1995-PalsbergO #λ-calculus
Trust in the λ-Calculus (JP, ), pp. 314–329.
TAPSOFTTAPSOFT-1995-Orbaek #question
Can you Trust your Data? (), pp. 575–589.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.