Stem trustworthi$ (all stems)
45 papers:
VLDB-2015-DongGMDHLSZ #knowledge-based #trust #web- Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources (XLD, EG, KM, VD, WH, CL, SS, WZ), pp. 938–949.
SAC-2015-DihegoSO #component- Constructive extensibility of trustworthy component-based systems (JD, AS, MVMO), pp. 1808–1814.
DAC-2014-SullivanBZZJ #functional #hardware #identification #named- FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness (DS, JB, GZ, SZ, YJ), p. 4.
CSCW-2014-KnowlesHBDHRW #design- Trustworthy by design (BK, MH, LB, ND, JH, MR, JW), pp. 1060–1071.
LCT-TRE-2014-Schulz #internet- Creating Universal Designed and Trustworthy Objects for the Internet of Things (TS), pp. 206–214.
SCSM-2014-HardjonoDC #design #framework #on the #self- On the Design of Trustworthy Compute Frameworks for Self-organizing Digital Institutions (TH, PD, JHC), pp. 342–353.
FSE-2014-Cleland-HuangRM #lightweight #traceability- Achieving lightweight trustworthy traceability (JCH, MR, PM), pp. 849–852.
OSDI-2014-WangLZCT #framework #interpreter #kernel #named- Jitk: A Trustworthy In-Kernel Interpreter Infrastructure (XW, DL, NZ, AC, ZT), pp. 33–47.
DAC-2013-ZhangRJ #network #towards- Towards trustworthy medical devices and body area networks (MZ, AR, NKJ), p. 6.
HCI-UC-2013-RossvollF #social #social media- Trustworthy and Inclusive Identity Management for Applications in Social Media (THR, LF), pp. 68–77.
EDOC-2013-GallegeGHR #contract #monitoring #trust #using- Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
EDOC-2013-MukkamalaHS #adaptation #graph #towards- Towards Trustworthy Adaptive Case Management with Dynamic Condition Response Graphs (RRM, TTH, TS), pp. 127–136.
KDD-2013-GeGLZ #estimation #learning #multi- Multi-source deep learning for information trustworthiness estimation (LG, JG, XL, AZ), pp. 766–774.
SEKE-2013-WangWTZ #evaluation #named #network #recommendation #trust- STERS: A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network (S) (YW, JW, YT, JZ), pp. 322–325.
ECOOP-2013-CutsemM #invariant- Trustworthy Proxies — Virtualizing Objects with Invariants (TVC, MSM), pp. 154–178.
WICSA-ECSA-2012-KuzZBSX #approach #architecture #effectiveness- An Architectural Approach for Cost Effective Trustworthy Systems (IK, LZ, LB, MS, XX), pp. 325–328.
KDD-2012-KohaviDFLWX #online- Trustworthy online controlled experiments: five puzzling outcomes explained (RK, AD, BF, RL, TW, YX), pp. 786–794.
KDD-2012-WuWCT #detection #hybrid #named #recommendation- HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation (ZW, JW, JC, DT), pp. 985–993.
PLEASE-2012-LiY #product line- Enhance value by building trustworthy software-reliant system of systems from software product lines (DL, YY), pp. 13–16.
ICTSS-2012-BrauerPS #modelling #performance #testing #tool support- Efficient and Trustworthy Tool Qualification for Model-Based Testing Tools (JB, JP, US), pp. 8–23.
CSCW-2011-HoZ- i-sensor inference model for assessing trustworthiness in computer-mediated communications (SMH, XZ), pp. 645–648.
OOPSLA-2011-DarulovaK #scala- Trustworthy numerical computation in Scala (ED, VK), pp. 325–344.
SOSP-2011-SirerBRSWWS #architecture #logic- Logical attestation: an authorization architecture for trustworthy computing (EGS, WdB, PR, AS, KW, DW, FBS), pp. 249–264.
CSCW-2010-Toma #online #visual notation- Perceptions of trustworthiness online: the role of visual and textual information (CLT), pp. 13–22.
ICEIS-AIDSS-2010-UrbanoRO #assessment- Refining the Trustworthiness Assessment of Suppliers through Extraction of Stereotypes (JU, APR, ECO), pp. 85–92.
ICEIS-J-2010-UrbanoRO10a #metric #using- Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
CIKM-2010-DondioB #comparison- Comparison of six aggregation strategies to compute users’ trustworthiness (PD, SB), pp. 1773–1776.
SEKE-2010-ZhaoXWX #named #repository #resource management #reuse- TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse (JZ, BX, YW, YX), pp. 752–756.
SAC-2010-SkopikSD #interactive- Trustworthy interaction balancing in mixed service-oriented systems (FS, DS, SD), pp. 799–806.
ICLP-2010-Lopez10 #modelling #process- Models for Trustworthy Service and Process Oriented Systems (HAL), pp. 270–276.
FM-2009-RamosSM #component #development- Systematic Development of Trustworthy Component Systems (RR, AS, AM), pp. 140–156.
CHI-2009-KostakosO #assessment #design #trust- Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust (VK, IO), pp. 329–332.
RE-2009-LongLYJ #approach #evaluation #requirements #security- AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
ECSA-2008-MohammadA #architecture #component #named- TADL — An Architecture Description Language for Trustworthy Component-Based Systems (MM, VSA), pp. 290–297.
FM-2008-LintelmanRLS #formal method #security- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
CSCW-2008-KitturSC #trust #wiki- Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia (AK, BS, EHC), pp. 477–480.
ICEIS-J-2008-IbrahimNM08a #web- “Fact or Fiction?” Imposing Legitimacy for Trustworthy Information on the Web: A Qualitative Inquiry (ENMI, NLMN, SM), pp. 297–306.
DAC-2007-IrvineL #hardware #question- Trusted Hardware: Can It Be Trustworthy? (CEI, KNL), pp. 1–4.
VLDB-2006-MitraHW #keyword- Trustworthy Keyword Search for Regulatory-Compliant Record Retention (SM, WWH, MW), pp. 1001–1012.
SAC-2006-ZuoP #evaluation #trust- Information trustworthiness evaluation based on trust combination (YZ, BP), pp. 1880–1885.
SIGMOD-2005-ZhuH- Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records (QZ, WWH), pp. 395–406.
ICSE-2003-FredrikssonG- Trustworthy and sustainable operations in marine environments (MF, RG), pp. 806–807.
CADE-2002-SchneckN #approach #scalability- A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code (RRS, GCN), pp. 47–62.
HCI-CCAD-1999-MulkenAM #empirical #interface- An empirical study on the trustworthiness of life-like interface agents (SvM, EA, JM), pp. 152–156.
TAV-1989-Gerhart #assessment #formal method #summary- Preliminary Summary: FM89 Assessment of Formal Methods for Trustworthy Computer Systems (SLG), pp. 152–155.