Tag #trust
229 papers:
DiGRA-2019-Fleet #bound- Boundaries, Trust and Reputation in Virtual and Illicit Markets (RF).
KDD-2019-ZouZCW0 #optimisation #policy- Separated Trust Regions Policy Optimization Method (LZ, ZZ, YC, XW, WZ0), pp. 1471–1479.
ICML-2018-DunnerLGBHJ #algorithm #distributed #higher-order- A Distributed Second-Order Algorithm You Can Trust (CD, AL, MG, AB, TH, MJ), pp. 1357–1365.
MSR-2017-ZolfaghariniaAG #empirical- Do not trust build results at face value: an empirical study of 30 million CPAN builds (MZ, BA, YGG), pp. 312–322.
ICML-2017-HonerNBMG #detection #robust- Minimizing Trust Leaks for Robust Sybil Detection (JH, SN, AB0, KRM, NG), pp. 1520–1528.
CASE-2017-WuXS #network #protocol- Trust-based protocol for securing routing in opportunistic networks (XW, JX, JS), pp. 434–439.
CHI-PLAY-2016-DeppingMJBT #game studies #social- Trust Me: Social Games are Better than Social Icebreakers at Building Trust (AED, RLM, CJ, JTB, SCT), pp. 116–129.
CIKM-2016-JangFKKH #information management #named #performance- PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information (MHJ, CF, SWK, UK, JH), pp. 629–638.
KDD-2016-Ribeiro0G #classification #predict #quote #why- “Why Should I Trust You?”: Explaining the Predictions of Any Classifier (MTR, SS0, CG), pp. 1135–1144.
CASE-2016-RahmanWWMPR #assembly #collaboration #flexibility- Trust-based compliant robot-human handovers of payloads in collaborative assembly in flexible manufacturing (SMMR, YW, IDW, LM, RP, SR), pp. 355–360.
VLDB-2015-DongGMDHLSZ #knowledge-based #web- Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources (XLD, EG, KM, VD, WH, CL, SS, WZ), pp. 938–949.
FDG-2015-JohanssonVK #game studies #multi #online- I am being watched by the Tribunal: Trust and control in Multiplayer Online Battle Arena games (MJ, HV, YK).
CHI-2015-HardingKDR #human-computer- HCI, Civic Engagement & Trust (MH, BK, ND, MR), pp. 2833–2842.
CSCW-2015-KnowlesRHDBHWW #modelling- Models and Patterns of Trust (BK, MR, MH, ND, LB, JH, JW, DW), pp. 328–338.
HCI-DE-2015-SalanitriHBLSW #usability- Relationship Between Trust and Usability in Virtual Environments: An Ongoing Study (DS, CH, SB, GL, SS, BW), pp. 49–59.
HCI-IT-2015-KhataeiA #persuasion- Trust-Based Individualization for Persuasive Presentation Builder (AK, AA), pp. 418–428.
ICML-2015-SchulmanLAJM #optimisation #policy- Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
KDD-2015-Dhar #question- Should You Trust Your Money to a Robot? (VD), p. 1625.
RecSys-2015-ForsatiBMER #algorithm #named #performance #recommendation- PushTrust: An Efficient Recommendation Algorithm by Leveraging Trust and Distrust Relations (RF, IB, FM, AHE, HR), pp. 51–58.
ECOOP-2015-VekrisCJ #type system #verification- Trust, but Verify: Two-Phase Typing for Dynamic Languages (PV, BC, RJ), pp. 52–75.
ICSE-v2-2015-EtienneMAD #modelling #performance #predict #process #proving- Improving Predictability, Efficiency and Trust of Model-Based Proof Activity (JFÉ, MM, FA, VD), pp. 139–148.
SAC-2015-GkorouPE #distributed #network- Trust-based collection of information in distributed reputation networks (DG, JAP, DHJE), pp. 2312–2319.
SAC-2015-SharmaMDH - Bi-directional trust index computation in resource marketplace (AS, TM, PD, VGH), pp. 2305–2311.
CGO-2015-RohouSS #branch #performance #predict- Branch prediction and the performance of interpreters: don’t trust folklore (ER, BNS, AS), pp. 103–114.
DAC-2015-BrasserMSWK #named- TyTAN: tiny trust anchor for tiny devices (FFB, BEM, ARS, CW, PK), p. 6.
QoSA-2014-Meyer #question #verification- Trust or verify? (BM), pp. 1–2.
HT-2014-TangHL #social #social media- Is distrust the negation of trust?: the value of distrust in social media (JT, XH, HL), pp. 148–157.
CHI-2014-GarbettCEGO #interface #people- Finding “real people”: trust and diversity in the interface between professional and citizen journalists (ATG, RC, PE, MG, PO), pp. 3015–3024.
CHI-2014-PanSS #interactive- Comparing flat and spherical displays in a trust scenario in avatar-mediated interaction (YP, WS, AS), pp. 1397–1406.
HCI-AS-2014-NiedoberHMKSCJL #automation #case study- Influence of Cultural, Organizational and Automation Factors on Human-Automation Trust: A Case Study of Auto-GCAS Engineers and Developmental History (DJN, NTH, GM, KK, MS, AC, WJ, JBL), pp. 473–484.
HCI-AS-2014-TsengT #complexity #correlation #design #online #visual notation- The Correlation between Visual Complexity and User Trust in On-line Shopping: Implications for Design (KTT, YCT), pp. 90–99.
LCT-NLE-2014-SousaLD #human-computer #towards- A Model for Human-Computer Trust — Contributions Towards Leveraging User Engagement (SCS, DRL, PD), pp. 128–137.
LCT-TRE-2014-BaldiniKLT #network #social- European Citizens and Their Trust in Social Networks (GB, IK, JL, MT), pp. 363–374.
SCSM-2014-LeonardoFGPSSUWC #identification #social #social media- Identifying Locations of Social Significance: Aggregating Social Media Content to Create a New Trust Model for Exploring Crowd Sourced Data and Information (ADL, SF, AG, FP, WS, TS, AU, DW, JBC), pp. 170–177.
CAiSE-2014-MoyanoBG - Trust-Aware Decision-Making Methodology for Cloud Sourcing (FM, KB, MCFG), pp. 136–149.
ICEIS-v2-2014-CalefatoLN #social #social media- Investigating the Effect of Social Media on Trust Building in Customer-supplier Relationships (FC, FL, NN), pp. 635–642.
CIKM-2014-MaLG #collaboration #community #recommendation- Improving Recommendation Accuracy by Combining Trust Communities and Collaborative Filtering (XM, HL, ZG), pp. 1951–1954.
RecSys-2014-FazeliLBDS #matrix #social- Implicit vs. explicit trust in social matrix factorization (SF, BL, AB, HD, PBS), pp. 317–320.
RecSys-2014-HarmanOAG #recommendation- Dynamics of human trust in recommender systems (JLH, JO, TFA, CG), pp. 305–308.
SIGIR-2014-YaoHHZ #modelling #recommendation- Modeling dual role preferences for trust-aware recommendation (WY, JH, GH, YZ), pp. 975–978.
SAC-2014-GuoZTBY #empirical #recommendation- From ratings to trust: an empirical study of implicit trust in recommender systems (GG, JZ, DT, AB, NYS), pp. 248–253.
DATE-2014-Jin #evaluation #proving #security #tool support- EDA tools trust evaluation through security property proofs (YJ), pp. 1–4.
DATE-2014-JinS #evaluation #realtime- Real-time trust evaluation in integrated circuits (YJ, DS), pp. 1–6.
TACAS-2014-HuthK #automation #named #reasoning- PEALT: An Automated Reasoning Tool for Numerical Aggregation of Trust Evidence (MH, JHPK), pp. 109–123.
CHI-2013-RaeTM #case study #communication #experience- In-body experiences: embodiment, control, and trust in robot-mediated communication (IR, LT, BM), pp. 1921–1930.
CSCW-2013-Al-AniBWTKMRP #developer #distributed #process- Globally distributed system developers: their trust expectations and processes (BAA, MJB, YW, ET, BK, SM, DFR, RP), pp. 563–574.
CSCW-2013-RollandL #collaboration #reliability #research #reuse- Beyond trust and reliability: reusing data in collaborative cancer epidemiology research (BR, CPL), pp. 435–444.
CSCW-2013-WangM #online #social #social media- Trust in online news: comparing social media and official media use by chinese citizens (YW, GM), pp. 599–610.
DUXU-NTE-2013-JaimesMR #tool support- Increasing Trust in Personal Informatics Tools (LGJ, TM, AR), pp. 520–529.
HCI-UC-2013-BeldadS #experience #ll #online- It Was Nice with the Brick So Now I’ll Click: The Effects of Offline and Online Experience, Perceived Benefits, and Trust on Dutch Consumers’ Online Repeat Purchase Intention (AB, MS), pp. 371–380.
HCI-UC-2013-HayashiKO #empirical #network #social- An Empirical Investigation of Similarity-Driven Trust Dynamics in a Social Network (YH, VVK, HO), pp. 20–28.
HCI-UC-2013-HeupelBK #privacy- Trust and Privacy in the di.me Userware (MH, MB, DK), pp. 39–48.
HCI-UC-2013-NothdurftHM #human-computer- The Impact of Explanation Dialogues on Human-Computer Trust (FN, TH, WM), pp. 59–67.
HIMI-HSM-2013-HighamVMSB #automation- Training Air Traffic Controller Trust in Automation within a NextGen Environment (TMH, KPLV, JM, TZS, VB), pp. 76–84.
EDOC-2013-GallegeGHR #contract #monitoring #using- Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
RecSys-2013-Guo #recommendation #similarity- Integrating trust and similarity to ameliorate the data sparsity and cold start for recommender systems (GG), pp. 451–454.
SEKE-2013-WangWTZ #evaluation #named #network #recommendation- STERS: A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network (YW, JW, YT, JZ), pp. 322–325.
SAC-2013-AhmedE #network- Discovering influential nodes from trust network (SA, CIE), pp. 121–128.
SAC-2013-ChoCC #ad hoc #mobile #network- Composite trust-based public key management in mobile ad hoc networks (JHC, KSC, IRC), pp. 1949–1956.
SAC-2013-HabibVM #framework- A framework for evaluating trust of service providers in cloud marketplaces (SMH, VV, MM), pp. 1963–1965.
DAC-2013-ZhangYWSX #hardware #named #verification- VeriTrust: verification for hardware trust (JZ, FY, LW, ZS, QX), p. 8.
HT-2012-ShenSNT #network #online #social- Maximizing circle of trust in online social networks (YS, YSS, DTN, MTT), pp. 155–164.
CHI-2012-ChuangRMH #analysis #design #modelling #visualisation- Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
CHI-2012-FisherPDs #dataset #incremental #performance #scalability #visualisation- Trust me, I’m partially right: incremental visualization lets analysts explore large datasets faster (DF, IOP, SMD, MMCS), pp. 1673–1682.
CSCW-2012-VinesDBLMO - The joy of cheques: trust, paper and eighty somethings (JV, PD, MB, SL, AM, PO), pp. 147–156.
CIKM-2012-DuttingHW #recommendation- Maximizing revenue from strategic recommendations under decaying trust (PD, MH, IW), pp. 2283–2286.
CIKM-2012-HuangNHT #network #predict #social- Trust prediction via aggregating heterogeneous social networks (JH, FN, HH, YCT), pp. 1774–1778.
KDD-2012-TangLGS #comprehension #evolution #named #online- eTrust: understanding trust evolution in an online world (JT, HG, HL, ADS), pp. 253–261.
KMIS-2012-Kutay #information management #online- Trust Online for Information Sharing (CK), pp. 216–222.
SEKE-2012-HumayunG #empirical #using- An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
SIGIR-2012-Khatiban #mining #using- Building reputation and trust using federated search and opinion mining (SK), p. 994.
SAC-2012-NoorianFM - Preference-oriented QoS-based service discovery with dynamic trust and reputation management (ZN, MF, SM), pp. 2014–2021.
SAC-2012-YaichBJP #adaptation #community- An adaptive and Socially-Compliant Trust Management System for virtual communities (RY, OB, PJ, GP), pp. 2022–2028.
SAC-2012-ZhangI #protocol #web #web service #xml- An XML-based protocol for improving trust negotiation between Web Services (YZ, TI), pp. 1947–1954.
DATE-2012-JinMM #encryption #evaluation- Post-deployment trust evaluation in wireless cryptographic ICs (YJ, DM, YM), pp. 965–970.
TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #validation- The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
SIGITE-2011-LevySB #privacy- A trust-aware tag-based privacy control for eHealth 2.0 (KL, BS, YB), pp. 251–256.
ICPC-2011-Ali #analysis #automation #named #retrieval- Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
ICPC-2011-AliGA #requirements #traceability- Trust-Based Requirements Traceability (NA, YGG, GA), pp. 111–120.
MSR-2011-SinhaMS #developer #open source- Entering the circle of trust: developer initiation as committers in open-source projects (VSS, SM, SS), pp. 133–142.
SFM-2011-CostaIMMS #security- Security and Trust (GC, VI, FM, IM, RS), pp. 393–416.
CSCW-2011-SemaanM - Creating a context of trust with ICTs: restoring a sense of normalcy in the environment (BS, GM), pp. 255–264.
IDGD-2011-ZhangM - Once Broken, Never Fixed? The Impact of Culture and Medium on Repairing Trust in CMC (QZ, NM), pp. 341–350.
EDOC-2011-FatemiSW - Trust and Business Webs (HF, MvS, RW), pp. 119–128.
ICEIS-J-2011-Shen #comparison #comprehension #social- Understanding User’s Acceptance of Social Shopping Websites: Effects of Social Comparison and Trust (JS), pp. 365–373.
ICEIS-v3-2011-ViriyasitavatM #formal method #requirements #specification #workflow- Formalizing Trust Requirements and Specification in Service Workflow Environments (WV, AM), pp. 196–206.
ICEIS-v4-2011-HuGK #evaluation #modelling #network- Supply Chain Trust Evaluation Model based on Bayesian Network (XH, FG, YK), pp. 712–715.
ICEIS-v4-2011-ShenE #comparison #social- User Acceptance of Social Shopping Sites — Social Comparison and Trust (JS, LBE), pp. 219–224.
CIKM-2011-Fernandez-LuqueKM #named #retrieval- HealthTrust: trust-based retrieval of you tube’s diabetes channels (LFL, RK, GBM), pp. 1917–1920.
CIKM-2011-LoSZL #community #mining #network- Mining direct antagonistic communities in explicit trust networks (DL, DS, KZ, EPL), pp. 1013–1018.
ECIR-2011-ShiLH11a #how #question #recommendation- How Far Are We in Trust-Aware Recommendation? (YS, ML, AH), pp. 704–707.
KDD-2011-VydiswaranZR #framework- Content-driven trust propagation framework (VGVV, CZ, DR), pp. 974–982.
RecSys-2011-GorgoglionePT #behaviour #recommendation- The effect of context-aware recommendations on customer purchasing behavior and trust (MG, UP, AT), pp. 85–92.
ICSE-2011-MeneelyW #developer #metric #network #question- Socio-technical developer networks: should we trust our measurements? (AM, LW), pp. 281–290.
SAC-2011-BaoCCC #network- Hierarchical trust management for wireless sensor networks and its application to trust-based routing (FB, IRC, MC, JHC), pp. 1732–1738.
SAC-2011-SchryenVRH #approach #distributed #formal method #towards- A formal approach towards measuring trust in distributed systems (GS, MV, SR, SMH), pp. 1739–1745.
SIGMOD-2010-GatterbauerS #using- Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
CHI-2010-CramerESGW #mobile #social- Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
KDD-2010-ChuaL #generative #modelling #network #online #rating #using- Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
KMIS-2010-FaedAW - The Impact of Trust and Interactivity on Intensifying Customer Loyalty for CRM (AF, AA, CW), pp. 113–120.
RecSys-2010-JamaliE #matrix #network #recommendation #social- A matrix factorization technique with trust propagation for recommendation in social networks (MJ, ME), pp. 135–142.
SAC-2010-DolevGK #multi #scalability- Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time (SD, NG, MK), pp. 1460–1465.
SAC-2010-OCallaghanDC #grid- Evaluating trust in grid certificates (DO, LD, BAC), pp. 1449–1450.
SAC-2010-SaadiPB #2d #named- T2D: a peer to peer trust management system based on disposition to trust (RS, JMP, LB), pp. 1472–1478.
SAC-2010-YadavS #framework #named #network- iTrust: an integrated trust framework for wireless sensor networks (KY, AS), pp. 1466–1471.
HPDC-2010-GehaniK #multi #named #verification- Mendel: efficiently verifying the lineage of data modified in multiple trust domains (AG, MK), pp. 227–239.
OSDI-2010-MahajanSLCADW #named- Depot: Cloud Storage with Minimal Trust (PM, STVS, SL, AC, LA, MD, MW), pp. 307–322.
OSDI-2010-TangMK #operating system- Trust and Protection in the Illinois Browser Operating System (ST, HM, STK), pp. 17–32.
CHI-2009-CramerESW #adaptation #interactive- Awareness, training and trust in interaction with adaptive spam filters (HSMC, VE, MvS, BJW), pp. 909–912.
CHI-2009-KostakosO #assessment #design- Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust (VK, IO), pp. 329–332.
CHI-2009-ScissorsGGG #similarity- In CMC we trust: the role of similarity (LES, AJG, KG, DG), pp. 527–536.
HCI-AUII-2009-DetweilerB #guidelines #online #towards- Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory (CD, JB), pp. 605–614.
OCSC-2009-Jameson #community #distributed #online- Distributed Leadership, Trust and Online Communities (JJ), pp. 226–235.
ICEIS-DISI-2009-CastilloCGPPV #network #quality- Establishing Trust Networks based on Data Quality Criteria for Selecting Data Suppliers (RPC, IC, IGRdG, MP, MP, EV), pp. 37–42.
ICEIS-SAIC-2009-PetersA #analysis #on the #platform- On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
CIKM-2009-LiuDRL #named #personalisation- StereoTrust: a group based personalized trust model (XL, AD, KR, EPL), pp. 7–16.
CIKM-2009-SunWL #injection- Injecting purpose and trust into data anonymisation (XS, HW, JL), pp. 1541–1544.
ICML-2009-RaykarYZJFVBM #learning #multi- Supervised learning from multiple experts: whom to trust when everyone lies a bit (VCR, SY, LHZ, AKJ, CF, GHV, LB, LM), pp. 889–896.
KDD-2009-JamaliE #named #random #recommendation- TrustWalker: a random walk model for combining trust-based and item-based recommendation (MJ, ME), pp. 397–406.
KMIS-2009-SadaranganiA - The Role of Trust in Impact of Leadership on Knowledge Sharing (PS, AA), pp. 266–270.
RecSys-2009-Golbeck #recommendation #social #tutorial #using- Tutorial on using social trust for recommender systems (JG), pp. 425–426.
RecSys-2009-JamaliE #network #recommendation #using- Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
RecSys-2009-MaLK #learning #recommendation- Learning to recommend with trust and distrust relationships (HM, MRL, IK), pp. 189–196.
RecSys-2009-MoghaddamJEH #feedback #named #recommendation #using- FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
RecSys-2009-Tavakolifard - Situation-aware trust management (MT), pp. 413–416.
RecSys-2009-WalterBS #network #personalisation #social- Personalised and dynamic trust in social networks (FEW, SB, FS), pp. 197–204.
SIGIR-2009-MaKL #learning #recommendation #social- Learning to recommend with social trust ensemble (HM, IK, MRL), pp. 203–210.
RE-2009-ElahiY #analysis #requirements #security #trade-off- Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
SAC-2009-AhamedKHZ #security #towards- Towards developing a trust-based security solution (SIA, DK, CSH, MZ), pp. 2204–2205.
SAC-2009-Huynh #assessment #framework #personalisation- A personalized framework for trust assessment (TDH), pp. 1302–1307.
SAC-2009-PengC #collaboration #multi #named #recommendation- iTrustU: a blog recommender system based on multi-faceted trust and collaborative filtering (TCP, ScTC), pp. 1278–1285.
SAC-2009-Ries #modelling #representation- Extending Bayesian trust models regarding context-dependence and user friendly representation (SR), pp. 1294–1301.
SAC-2009-UddinZ #algorithm #automation #monitoring #named- ATM: an automatic trust monitoring algorithm for service software (MGU, MZ), pp. 1040–1044.
SAC-2009-YangSKY #collaboration #modelling #online- Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
JCDL-2008-CaverleeLW #community #named #online- Socialtrust: tamper-resilient trust establishment in online communities (JC, LL, SW), pp. 104–114.
CHI-2008-Kindberg - Measuring trust in wi-fi hotspots (TK), pp. 173–182.
CSCW-2008-KitturSC #wiki- Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia (AK, BS, EHC), pp. 477–480.
CSCW-2008-ScissorsGG - Linguistic mimicry and trust in text-based CMC (LES, AJG, DG), pp. 277–280.
ICEIS-AIDSS-2008-Portillo-RodriguezSVP #community- A Model to Rate Trust in Communities of Practice (JPR, JPS, AV, MP), pp. 193–198.
ICEIS-HCI-2008-IbrahimNM #web- Wisdom on the Web: On Trust, Institution and Symbolisms — A Preliminary Investigation (ENMI, NLMN, SM), pp. 13–20.
ICEIS-SAIC-2008-BninaCNA #question #what- What Can Context Do for Trust in Manets? (EBB, OC, CTN, HKBA), pp. 133–141.
ICEIS-SAIC-2008-PetersDW #e-commerce- Consumer-to-Consumer Trust in E-Commerce — Are there Rules for Writing Helpful Product Reviews (GP, MD, RW), pp. 61–66.
CIKM-2008-KazaiM #information retrieval #social- Trust, authority and popularity in social information retrieval (GK, NMF), pp. 1503–1504.
RecSys-2008-Lee #named #recommendation- PITTCULT: trust-based cultural event recommender (DHL), pp. 311–314.
SEKE-2008-YangE #delivery #multi- Integrating Trust Management into Usage Control in P2P Multimedia Delivery (LY, RKE), pp. 411–416.
SAC-2008-AdnaneSBM #behaviour #detection #reasoning- Autonomic trust reasoning enables misbehavior detection in OLSR (AA, RTdSJ, CB, LM), pp. 2006–2013.
SAC-2008-AhamedHT #pervasive- Service sharing with trust in pervasive environment: now it’s time to break the jinx (SIA, MMH, NT), pp. 1622–1628.
SAC-2008-BistarelliS #multi #network- Propagating multitrust within trust networks (SB, FS), pp. 1990–1994.
SAC-2008-Nassiri #3d #e-commerce #using- Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
SAC-2008-UddinZ #named #towards- UMLtrust: towards developing trust-aware software (MGU, MZ), pp. 831–836.
SAC-2008-UddinZA #named- CAT: a context-aware trust model for open and dynamic systems (MGU, MZ, SIA), pp. 2024–2029.
SAC-2008-VictorCTC #recommendation- Whom should I trust?: the impact of key figures on cold start recommendations (PV, CC, AT, MDC), pp. 2014–2018.
PDP-2008-CeccatoNT #performance #verification- Distributing Trust Verification to Increase Application Performance (MC, JN, PT), pp. 604–610.
ESOP-2008-CirilloJPR #distributed #named- Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (AC, RJ, CP, JR), pp. 208–223.
ICLP-2008-BonattiCOS #privacy #security- Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
ECDL-2007-WallisBMPRH #library #quality- Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries (JCW, CLB, MSM, AP, NR, MHH), pp. 380–391.
HT-2007-MoganW #case study #information management- A study into user perceptions of information sharing and trust in virtual teams (SM, WW), pp. 43–44.
CHI-2007-NguyenC #multi #named #video- Multiview: improving trust in group video conferencing through spatial faithfulness (DTN, JC), pp. 1465–1474.
HCI-AS-2007-LowryRH - First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites (PBL, TLR, TH), pp. 77–85.
HIMI-IIE-2007-IbrahimNM #concept #framework #online #web- “Seeing Is Not Believing But Interpreting”, Inducing Trust Through Institutional Symbolism: A Conceptual Framework for Online Trust Building in a Web Mediated Information Environment (ENMI, NLMN, SM), pp. 64–73.
OCSC-2007-XiongYZYL #grid #peer-to-peer- A Trust-Based Reputation System in Peer-to-Peer Grid (ZX, YY, XZ, DY, LL), pp. 228–235.
ICEIS-EIS-2007-JoyceW - Building, and Losing, Consumer Trust in B2C E-Business (PJ, GW), pp. 55–62.
ICEIS-EIS-2007-SchmidtDSC #ontology- Trust and Reputation Ontologies for Electronic Business (SS, TSD, RS, EC), pp. 308–315.
ECIR-2007-BriggsS #social- Harnessing Trust in Social Search (PB, BS), pp. 525–532.
ICML-2007-LinWK #scalability- Trust region Newton methods for large-scale logistic regression (CJL, RCW, SSK), pp. 561–568.
RecSys-2007-MassaA #recommendation- Trust-aware recommender systems (PM, PA), pp. 17–24.
SEKE-2007-PatelXG #online #realtime- Real-Time Trust Management in Agent Based Online Auction Systems (RP, HX, AG), pp. 244–250.
SIGIR-2007-NieWD #web- Winnowing wheat from the chaff: propagating trust to sift spam from the web (LN, BW, BDD), pp. 869–870.
PPDP-2007-HristovaTL #analysis #performance #policy- Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
SAC-2007-BillhardtHOC - Trust-based service provider selection in open environments (HB, RH, SO, RC), pp. 1375–1380.
SAC-2007-NakamuraM #design #linux- Designing a trust chain for a thin client on a live Linux cd (MN, SM), pp. 1605–1606.
SAC-2007-Ries - Certain trust: a trust model for users and agents (SR), pp. 1599–1604.
DATE-2007-Casale-RossiSADGMPS #named #product line #question- DFM/DFY: should you trust the surgeon or the family doctor? (MCR, AJS, RCA, AD, CG, PM, DP, JS), pp. 439–442.
DATE-2007-VerbauwhedeS #design #security- Design methods for security and trust (IV, PS), pp. 672–677.
DATE-2007-WagnerB #semantics- Engineering trust with semantic guardians (IW, VB), pp. 743–748.
ICLP-2007-CzenkoE #logic programming- Core TuLiP Logic Programming for Trust Management (MC, SE), pp. 380–394.
FLOPS-2006-PimlottK - Soutei, a Logic-Based Trust-Management System (AP, OK), pp. 130–145.
CAiSE-2006-Kritis - Dealing with Trust in eGov Services (VK), pp. 18–19.
CAiSE-2006-Sutcliffe #concept #design #modelling #named- Trust: From Cognition to Conceptual Models and Design (AGS), pp. 3–17.
PPDP-2006-GorlaHS - Inferring dynamic credentials for rôle-based trust management (DG, MH, VS), pp. 213–224.
ICSE-2006-NguyenBV #maintenance #outsourcing- Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
ICSE-2006-SuryanarayanaDET #architecture #distributed #modelling- Architectural support for trust models in decentralized applications (GS, MHD, JRE, RNT), pp. 52–61.
SAC-2006-KotsovinosW #named #scalability- BambooTrust: practical scalable trust management for global public computing (EK, AW), pp. 1893–1897.
SAC-2006-QuerciaLHCB #named- STRUDEL: supporting trust in the dynamic establishment of peering coalitions (DQ, ML, SH, LC, SB), pp. 1870–1874.
SAC-2006-WengMG #collaboration #metric- Improving collaborative filtering with trust-based metrics (JW, CM, AG), pp. 1860–1864.
SAC-2006-ZuoP #evaluation- Information trustworthiness evaluation based on trust combination (YZ, BP), pp. 1880–1885.
OSDI-2006-Ta-MinLL #configuration management #interface #operating system- Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable (RTM, LL, DL), pp. 279–292.
TACAS-2006-JhaSWR #automaton- Weighted Pushdown Systems and Trust-Management Systems (SJ, SS, HW, TWR), pp. 1–26.
SIGMOD-2005-ChaudhuriKR #query #question #sql- When Can We Trust Progress Estimators for SQL Queries? (SC, RK, RR), pp. 575–586.
ICEIS-v3-2005-ZhaoVB #collaboration #distributed #interactive- Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments (WZ, VV, GB), pp. 331–336.
CIKM-2005-WengMGL #collaboration- Trust-based collaborative filtering (JW, CM, AG, DL), pp. 299–300.
SAC-2005-BicakciCT #certification #how #metric- How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
SAC-2005-WieringaG #coordination #correctness #design #process- Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
SAC-2005-ZuoP #component- Component based trust management in the context of a virtual organization (YZ, BP), pp. 1582–1588.
PPoPP-2005-YangBHM #correctness #monitoring #source code #verification- Trust but verify: monitoring remotely executing programs for progress and correctness (SY, ARB, YCH, SPM), pp. 196–205.
WICSA-2004-SuryanarayanaEHT #architecture #distributed #named- PACE: An Architectural Style for Trust Management in Decentralized Applications (GS, JRE, SAH, RNT), pp. 221–232.
VLDB-2004-SkogsrudBCD #lightweight #named- Trust-Serv: A Lightweight Trust Negotiation Service (HS, BB, FC, MQD), pp. 1329–1332.
CHI-2004-SillenceBFH #health #online- Trust and mistrust of online health sites (ES, PB, LF, PRH), pp. 663–670.
RE-2004-HaleyLMN #requirements #security- The Effect of Trust Assumptions on the Elaboration of Security Requirements (CBH, RCL, JDM, BN), pp. 102–111.
FSE-2004-Capra #mobile- Engineering human trust in mobile system collaborations (LC), pp. 107–116.
SAC-2004-SeigneurJ #privacy #ubiquitous- Trust enhanced ubiquitous payment without too much privacy loss (JMS, CDJ), pp. 1593–1599.
ESOP-2004-GuttmanTCHRS - Trust Management in Strand Spaces: A Rely-Guarantee Method (JDG, FJT, JAC, JCH, JDR, BTS), pp. 325–339.
VMCAI-2004-Guttman #protocol #security- Security, Protocols, and Trust (JDG), p. 1.
SEFM-2003-CarboneNS #formal method #network- A Formal Model for Trust in Dynamic Networks (MC, MN, VS), p. 54–?.
CHI-2003-RiegelsbergerSM #e-commerce #people- Shiny happy people building trust?: photos on e-commerce websites and consumer trust (JR, MAS, JDM), pp. 121–128.
ICEIS-v1-2003-LocMP #approach #component- Try and Patch: An Approach to Improve the Trust in Software Components (PTXL, PM, GP), pp. 505–508.
ICEIS-v4-2003-PerkinsJBC #collaboration #information management- Building Supply Chain Relationships with Knowledge Management: Engineering Trust in Collaborative Systems (JP, AKJ, LB, SC), pp. 63–70.
ICEIS-v4-2003-Vasiu #security #web #web service- Security Web Services Based on Trust (LV), pp. 369–376.
PADL-2003-LiM #constraints #datalog- DATALOG with Constraints: A Foundation for Trust Management Languages (NL, JCM), pp. 58–73.
PPDP-2003-NielsenK #towards- Towards a formal notion of trust (MN, KK), pp. 4–7.
SAC-2003-CazierSL #privacy- Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
JCDL-2002-House #community- Trust and epistemic communities in biodiversity data sharing (NAVH), pp. 231–239.
CHI-2002-BosOGOW #development- Effects of four computer-mediated communications channels on trust development (NB, JSO, DG, GMO, ZW), pp. 135–140.
CHI-2002-ZhengVBOO #process #social- Trust without touch: jumpstarting long-distance trust with initial social activities (JZ, ESV, NB, JSO, GMO), pp. 141–146.
CBSE-2001-Voas #certification #component- Component Trust and Certification (JV), p. 1.
CSEET-2001-DuleyMV #industrial- Teamwork and Trust: Universities, industry and the professional software engineer (RD, SPM, DV), pp. 153–161.
CHI-2001-BickmoreC #implementation #relational- Relational agents: a model and implementation of building user trust (TWB, JC), pp. 396–403.
ICEIS-v2-2001-GochenouerT #internet #privacy- Privacy Audits and Trust: The Internet Dilemma (JEG, MLT), pp. 905–909.
CIKM-2001-AbererD #information management- Managing Trust in a Peer-2-Peer Information System (KA, ZD), pp. 310–317.
PPDP-2001-HepburnW #π-calculus- Trust in the π-Calculus (MH, DW), pp. 103–114.
RE-2001-GansJKLEFM #approach #modelling #network #requirements- Requirements Modeling for Organization Networks: A (Dis-)Trust-Based Approach (GG, MJ, SK, GL, LE, CF, MM), pp. 154–165.
CSCW-2000-GreenspanGWB #communication- Interpersonal trust and common ground in electronically mediated communication (SG, DG, DMW, AB), pp. 251–260.
ICSE-2000-HeinemanCFMSS #component #re-engineering- Component-based software engineering and the issue of trust (GTH, WTC, JSF, AM, JRS, MS), pp. 661–664.
TOOLS-USA-1999-CrichtonDW #data access #mobile- When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
POPL-1999-RielyH #mobile #type system- Trust and Partial Typing in Open Systems of Mobile Agents (JR, MH), pp. 93–104.
CHI-1998-Rocco - Trust Breaks Down in Electronic Contexts But Can Be Repaired by Some Initial Face-to-Face Contact (ER), pp. 496–502.
CSCW-1998-HouseBS #information management #set- Cooperative Knowledge Work and Practices of Trust: Sharing Environmental Planning Data Sets (NAVH, MHB, LRS), pp. 335–343.
SAS-1995-PalsbergO #λ-calculus- Trust in the λ-Calculus (JP, PØ), pp. 314–329.
TAPSOFT-1995-Orbaek #question- Can you Trust your Data? (PØ), pp. 575–589.