BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
system (10)
base (7)
trust (7)
comput (6)
servic (5)

Stem trustworthi$ (all stems)

45 papers:

VLDBVLDB-2015-DongGMDHLSZ #knowledge-based #trust #web
Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources (XLD, EG, KM, VD, WH, CL, SS, WZ), pp. 938–949.
SACSAC-2015-DihegoSO #component
Constructive extensibility of trustworthy component-based systems (JD, AS, MVMO), pp. 1808–1814.
DACDAC-2014-SullivanBZZJ #functional #hardware #identification #named
FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness (DS, JB, GZ, SZ, YJ), p. 4.
CSCWCSCW-2014-KnowlesHBDHRW #design
Trustworthy by design (BK, MH, LB, ND, JH, MR, JW), pp. 1060–1071.
HCILCT-TRE-2014-Schulz #internet
Creating Universal Designed and Trustworthy Objects for the Internet of Things (TS), pp. 206–214.
HCISCSM-2014-HardjonoDC #design #framework #on the #self
On the Design of Trustworthy Compute Frameworks for Self-organizing Digital Institutions (TH, PD, JHC), pp. 342–353.
FSEFSE-2014-Cleland-HuangRM #lightweight #traceability
Achieving lightweight trustworthy traceability (JCH, MR, PM), pp. 849–852.
OSDIOSDI-2014-WangLZCT #framework #interpreter #kernel #named
Jitk: A Trustworthy In-Kernel Interpreter Infrastructure (XW, DL, NZ, AC, ZT), pp. 33–47.
DACDAC-2013-ZhangRJ #network #towards
Towards trustworthy medical devices and body area networks (MZ, AR, NKJ), p. 6.
HCIHCI-UC-2013-RossvollF #social #social media
Trustworthy and Inclusive Identity Management for Applications in Social Media (THR, LF), pp. 68–77.
EDOCEDOC-2013-GallegeGHR #contract #monitoring #trust #using
Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
EDOCEDOC-2013-MukkamalaHS #adaptation #graph #towards
Towards Trustworthy Adaptive Case Management with Dynamic Condition Response Graphs (RRM, TTH, TS), pp. 127–136.
KDDKDD-2013-GeGLZ #estimation #learning #multi
Multi-source deep learning for information trustworthiness estimation (LG, JG, XL, AZ), pp. 766–774.
SEKESEKE-2013-WangWTZ #evaluation #named #network #recommendation #trust
STERS: A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network (S) (YW, JW, YT, JZ), pp. 322–325.
ECOOPECOOP-2013-CutsemM #invariant
Trustworthy Proxies — Virtualizing Objects with Invariants (TVC, MSM), pp. 154–178.
WICSA-ECSAWICSA-ECSA-2012-KuzZBSX #approach #architecture #effectiveness
An Architectural Approach for Cost Effective Trustworthy Systems (IK, LZ, LB, MS, XX), pp. 325–328.
KDDKDD-2012-KohaviDFLWX #online
Trustworthy online controlled experiments: five puzzling outcomes explained (RK, AD, BF, RL, TW, YX), pp. 786–794.
KDDKDD-2012-WuWCT #detection #hybrid #named #recommendation
HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation (ZW, JW, JC, DT), pp. 985–993.
PLEASEPLEASE-2012-LiY #product line
Enhance value by building trustworthy software-reliant system of systems from software product lines (DL, YY), pp. 13–16.
ICTSSICTSS-2012-BrauerPS #modelling #performance #testing #tool support
Efficient and Trustworthy Tool Qualification for Model-Based Testing Tools (JB, JP, US), pp. 8–23.
CSCWCSCW-2011-HoZ
i-sensor inference model for assessing trustworthiness in computer-mediated communications (SMH, XZ), pp. 645–648.
OOPSLAOOPSLA-2011-DarulovaK #scala
Trustworthy numerical computation in Scala (ED, VK), pp. 325–344.
SOSPSOSP-2011-SirerBRSWWS #architecture #logic
Logical attestation: an authorization architecture for trustworthy computing (EGS, WdB, PR, AS, KW, DW, FBS), pp. 249–264.
CSCWCSCW-2010-Toma #online #visual notation
Perceptions of trustworthiness online: the role of visual and textual information (CLT), pp. 13–22.
ICEISICEIS-AIDSS-2010-UrbanoRO #assessment
Refining the Trustworthiness Assessment of Suppliers through Extraction of Stereotypes (JU, APR, ECO), pp. 85–92.
ICEISICEIS-J-2010-UrbanoRO10a #metric #using
Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
CIKMCIKM-2010-DondioB #comparison
Comparison of six aggregation strategies to compute users’ trustworthiness (PD, SB), pp. 1773–1776.
SEKESEKE-2010-ZhaoXWX #named #repository #resource management #reuse
TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse (JZ, BX, YW, YX), pp. 752–756.
SACSAC-2010-SkopikSD #interactive
Trustworthy interaction balancing in mixed service-oriented systems (FS, DS, SD), pp. 799–806.
ICLPICLP-2010-Lopez10 #modelling #process
Models for Trustworthy Service and Process Oriented Systems (HAL), pp. 270–276.
FMFM-2009-RamosSM #component #development
Systematic Development of Trustworthy Component Systems (RR, AS, AM), pp. 140–156.
CHICHI-2009-KostakosO #assessment #design #trust
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust (VK, IO), pp. 329–332.
RERE-2009-LongLYJ #approach #evaluation #requirements #security
AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
ECSAECSA-2008-MohammadA #architecture #component #named
TADL — An Architecture Description Language for Trustworthy Component-Based Systems (MM, VSA), pp. 290–297.
FMFM-2008-LintelmanRLS #formal method #security
Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
CSCWCSCW-2008-KitturSC #trust #wiki
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia (AK, BS, EHC), pp. 477–480.
ICEISICEIS-J-2008-IbrahimNM08a #web
“Fact or Fiction?” Imposing Legitimacy for Trustworthy Information on the Web: A Qualitative Inquiry (ENMI, NLMN, SM), pp. 297–306.
DACDAC-2007-IrvineL #hardware #question
Trusted Hardware: Can It Be Trustworthy? (CEI, KNL), pp. 1–4.
VLDBVLDB-2006-MitraHW #keyword
Trustworthy Keyword Search for Regulatory-Compliant Record Retention (SM, WWH, MW), pp. 1001–1012.
SACSAC-2006-ZuoP #evaluation #trust
Information trustworthiness evaluation based on trust combination (YZ, BP), pp. 1880–1885.
SIGMODSIGMOD-2005-ZhuH
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records (QZ, WWH), pp. 395–406.
ICSEICSE-2003-FredrikssonG
Trustworthy and sustainable operations in marine environments (MF, RG), pp. 806–807.
CADECADE-2002-SchneckN #approach #scalability
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code (RRS, GCN), pp. 47–62.
HCIHCI-CCAD-1999-MulkenAM #empirical #interface
An empirical study on the trustworthiness of life-like interface agents (SvM, EA, JM), pp. 152–156.
ISSTATAV-1989-Gerhart #assessment #formal method #summary
Preliminary Summary: FM89 Assessment of Formal Methods for Trustworthy Computer Systems (SLG), pp. 152–155.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.