BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (48)
system (40)
social (26)
recommend (25)
model (24)

Stem trust$ (all stems)

279 papers:

DACDAC-2015-BrasserMSWK #named #trust
TyTAN: tiny trust anchor for tiny devices (FFB, BEM, ARS, CW, PK), p. 6.
VLDBVLDB-2015-DongGMDHLSZ #knowledge-based #trust #web
Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources (XLD, EG, KM, VD, WH, CL, SS, WZ), pp. 938–949.
SANERSANER-2015-KulaGII #case study #latency #library
Trusting a library: A study of the latency to adopt the latest Maven release (RGK, DMG, TI, KI), pp. 520–524.
CHICHI-2015-HardingKDR #human-computer #trust
HCI, Civic Engagement & Trust (MH, BK, ND, MR), pp. 2833–2842.
CSCWCSCW-2015-KnowlesRHDBHWW #modelling #trust
Models and Patterns of Trust (BK, MR, MH, ND, LB, JH, JW, DW), pp. 328–338.
HCIHCI-DE-2015-SalanitriHBLSW #trust #usability
Relationship Between Trust and Usability in Virtual Environments: An Ongoing Study (DS, CH, SB, GL, SS, BW), pp. 49–59.
HCIHCI-IT-2015-KhataeiA #persuasion #trust
Trust-Based Individualization for Persuasive Presentation Builder (AK, AA), pp. 418–428.
ICMLICML-2015-SchulmanLAJM #optimisation #policy #trust
Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
ICMLICML-2015-TheisH #probability #streaming
A trust-region method for stochastic variational inference with applications to streaming data (LT, MDH), pp. 2503–2511.
KDDKDD-2015-Dhar #question #trust
Should You Trust Your Money to a Robot? (VD), p. 1625.
RecSysRecSys-2015-ForsatiBMER #algorithm #named #performance #recommendation #trust
PushTrust: An Efficient Recommendation Algorithm by Leveraging Trust and Distrust Relations (RF, IB, FM, AHE, HR), pp. 51–58.
ECOOPECOOP-2015-VekrisCJ #trust #type system #verification
Trust, but Verify: Two-Phase Typing for Dynamic Languages (PV, BC, RJ), pp. 52–75.
SACSAC-2015-BeckersHMG #internet #security
Engineering trust- and reputation-based security controls for future internet systems (KB, MH, FM, MCFG), pp. 1344–1349.
SACSAC-2015-GkorouPE #distributed #network #trust
Trust-based collection of information in distributed reputation networks (DG, JAP, DHJE), pp. 2312–2319.
SACSAC-2015-SharmaMDH #trust
Bi-directional trust index computation in resource marketplace (AS, TM, PD, VGH), pp. 2305–2311.
ICSEICSE-v2-2015-EtienneMAD #modelling #performance #predict #process #proving #trust
Improving Predictability, Efficiency and Trust of Model-Based Proof Activity (JFÉ, MM, FA, VD), pp. 139–148.
CGOCGO-2015-RohouSS #branch #performance #predict #trust
Branch prediction and the performance of interpreters: don’t trust folklore (ER, BNS, AS), pp. 103–114.
CAVCAV-2015-GardnerSWW #javascript #specification
A Trusted Mechanised Specification of JavaScript: One Year On (PG, GS, CW, TW), pp. 3–10.
QoSAQoSA-2014-Meyer #question #trust #verification
Trust or verify? (BM), pp. 1–2.
DACDAC-2014-TrimbergerM #security
FPGA Security: From Features to Capabilities to Trusted Systems (ST, JM), p. 4.
DATEDATE-2014-Jin #evaluation #proving #security #tool support #trust
EDA tools trust evaluation through security property proofs (YJ), pp. 1–4.
DATEDATE-2014-JinS #evaluation #realtime #trust
Real-time trust evaluation in integrated circuits (YJ, DS), pp. 1–6.
HTHT-2014-TangHL #social #social media #trust
Is distrust the negation of trust?: the value of distrust in social media (JT, XH, HL), pp. 148–157.
TACASTACAS-2014-HuthK #automation #named #reasoning #trust
PEALT: An Automated Reasoning Tool for Numerical Aggregation of Trust Evidence (MH, JHPK), pp. 109–123.
FMFM-2014-BaiHWLLM #formal method #model checking #named #towards
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms (GB, JH, JW, YL, ZL, AM), pp. 110–126.
CHICHI-2014-GarbettCEGO #interface #people #trust
Finding “real people”: trust and diversity in the interface between professional and citizen journalists (ATG, RC, PE, MG, PO), pp. 3015–3024.
CHICHI-2014-PanSS #interactive #trust
Comparing flat and spherical displays in a trust scenario in avatar-mediated interaction (YP, WS, AS), pp. 1397–1406.
HCIHCI-AS-2014-NiedoberHMKSCJL #automation #case study #trust
Influence of Cultural, Organizational and Automation Factors on Human-Automation Trust: A Case Study of Auto-GCAS Engineers and Developmental History (DJN, NTH, GM, KK, MS, AC, WJ, JBL), pp. 473–484.
HCIHCI-AS-2014-TsengT #complexity #correlation #design #online #trust #visual notation
The Correlation between Visual Complexity and User Trust in On-line Shopping: Implications for Design (KTT, YCT), pp. 90–99.
HCILCT-NLE-2014-SousaLD #human-computer #towards #trust
A Model for Human-Computer Trust — Contributions Towards Leveraging User Engagement (SCS, DRL, PD), pp. 128–137.
HCILCT-TRE-2014-BaldiniKLT #network #social #trust
European Citizens and Their Trust in Social Networks (GB, IK, JL, MT), pp. 363–374.
HCISCSM-2014-LeonardoFGPSSUWC #identification #social #social media #trust
Identifying Locations of Social Significance: Aggregating Social Media Content to Create a New Trust Model for Exploring Crowd Sourced Data and Information (ADL, SF, AG, FP, WS, TS, AU, DW, JBC), pp. 170–177.
CAiSECAiSE-2014-MoyanoBG #trust
Trust-Aware Decision-Making Methodology for Cloud Sourcing (FM, KB, MCFG), pp. 136–149.
ICEISICEIS-v2-2014-CalefatoLN #social #social media #trust
Investigating the Effect of Social Media on Trust Building in Customer-supplier Relationships (FC, FL, NN), pp. 635–642.
CIKMCIKM-2014-MaLG #collaboration #community #recommendation #trust
Improving Recommendation Accuracy by Combining Trust Communities and Collaborative Filtering (XM, HL, ZG), pp. 1951–1954.
RecSysRecSys-2014-FazeliLBDS #matrix #social #trust
Implicit vs. explicit trust in social matrix factorization (SF, BL, AB, HD, PBS), pp. 317–320.
RecSysRecSys-2014-HarmanOAG #recommendation #trust
Dynamics of human trust in recommender systems (JLH, JO, TFA, CG), pp. 305–308.
SIGIRSIGIR-2014-YaoHHZ #modelling #recommendation #trust
Modeling dual role preferences for trust-aware recommendation (WY, JH, GH, YZ), pp. 975–978.
POPLPOPL-2014-BodinCFGMNSS #specification
A trusted mechanised JavaSript specification (MB, AC, DF, PG, SM, DN, AS, GS), pp. 87–100.
SACSAC-2014-BasuCKMVG0M #feedback #privacy #social
Privacy preserving trusted social feedback (AB, JCC, SK, SM, JV, GG, JZ, YM), pp. 1706–1711.
SACSAC-2014-GuoZTBY #empirical #recommendation #trust
From ratings to trust: an empirical study of implicit trust in recommender systems (GG, JZ, DT, AB, NYS), pp. 248–253.
SACSAC-2014-WangMLG #recommendation #social
Recommendation based on weighted social trusts and item relationships (DW, JM, TL, LG), pp. 254–259.
ASPLOSASPLOS-2014-SantosRSW #mobile #runtime #using
Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
DACDAC-2013-ZhangYWSX #hardware #named #trust #verification
VeriTrust: verification for hardware trust (JZ, FY, LW, ZS, QX), p. 8.
CHICHI-2013-RaeTM #case study #communication #experience #trust
In-body experiences: embodiment, control, and trust in robot-mediated communication (IR, LT, BM), pp. 1921–1930.
CSCWCSCW-2013-Al-AniBWTKMRP #developer #distributed #process #trust
Globally distributed system developers: their trust expectations and processes (BAA, MJB, YW, ET, BK, SM, DFR, RP), pp. 563–574.
CSCWCSCW-2013-RollandL #collaboration #reliability #research #reuse #trust
Beyond trust and reliability: reusing data in collaborative cancer epidemiology research (BR, CPL), pp. 435–444.
CSCWCSCW-2013-WangM #online #social #social media #trust
Trust in online news: comparing social media and official media use by chinese citizens (YW, GM), pp. 599–610.
HCIDUXU-NTE-2013-JaimesMR #tool support #trust
Increasing Trust in Personal Informatics Tools (LGJ, TM, AR), pp. 520–529.
HCIHCI-UC-2013-BeldadS #experience #ll #online #trust
It Was Nice with the Brick So Now I’ll Click: The Effects of Offline and Online Experience, Perceived Benefits, and Trust on Dutch Consumers’ Online Repeat Purchase Intention (AB, MS), pp. 371–380.
HCIHCI-UC-2013-HayashiKO #empirical #network #social #trust
An Empirical Investigation of Similarity-Driven Trust Dynamics in a Social Network (YH, VVK, HO), pp. 20–28.
HCIHCI-UC-2013-HeupelBK #privacy #trust
Trust and Privacy in the di.me Userware (MH, MB, DK), pp. 39–48.
HCIHCI-UC-2013-NothdurftHM #human-computer #trust
The Impact of Explanation Dialogues on Human-Computer Trust (FN, TH, WM), pp. 59–67.
HCIHIMI-HSM-2013-HighamVMSB #automation #trust
Training Air Traffic Controller Trust in Automation within a NextGen Environment (TMH, KPLV, JM, TZS, VB), pp. 76–84.
EDOCEDOC-2013-GallegeGHR #contract #monitoring #trust #using
Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
RecSysRecSys-2013-Guo #recommendation #similarity #trust
Integrating trust and similarity to ameliorate the data sparsity and cold start for recommender systems (GG), pp. 451–454.
SEKESEKE-2013-WangWTZ #evaluation #named #network #recommendation #trust
STERS: A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network (S) (YW, JW, YT, JZ), pp. 322–325.
SACSAC-2013-AhmedE #network #trust
Discovering influential nodes from trust network (SA, CIE), pp. 121–128.
SACSAC-2013-ChoCC #ad hoc #mobile #network #trust
Composite trust-based public key management in mobile ad hoc networks (JHC, KSC, IRC), pp. 1949–1956.
SACSAC-2013-HabibVM #framework #trust
A framework for evaluating trust of service providers in cloud marketplaces (SMH, VV, MM), pp. 1963–1965.
DATEDATE-2012-JinMM #encryption #evaluation #trust
Post-deployment trust evaluation in wireless cryptographic ICs (YJ, DM, YM), pp. 965–970.
HTHT-2012-FahlHMS #named #network #social
TrustSplit: usable confidentiality for social network messaging (SF, MH, TM, MS), pp. 145–154.
HTHT-2012-ShenSNT #network #online #social #trust
Maximizing circle of trust in online social networks (YS, YSS, DTN, MTT), pp. 155–164.
TACASTACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #security #trust #validation
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
CHICHI-2012-ChuangRMH #analysis #design #modelling #trust #visualisation
Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
CHICHI-2012-FisherPDs #dataset #incremental #performance #scalability #trust #visualisation
Trust me, I’m partially right: incremental visualization lets analysts explore large datasets faster (DF, IOP, SMD, MMCS), pp. 1673–1682.
CSCWCSCW-2012-VinesDBLMO #trust
The joy of cheques: trust, paper and eighty somethings (JV, PD, MB, SL, AM, PO), pp. 147–156.
CIKMCIKM-2012-DuttingHW #recommendation #trust
Maximizing revenue from strategic recommendations under decaying trust (PD, MH, IW), pp. 2283–2286.
CIKMCIKM-2012-HuangNHT #network #predict #social #trust
Trust prediction via aggregating heterogeneous social networks (JH, FN, HH, YCT), pp. 1774–1778.
CIKMCIKM-2012-VydiswaranZRP #education #named #topic
BiasTrust: teaching biased users about controversial topics (VGVV, CZ, DR, PP), pp. 1905–1909.
KDDKDD-2012-TangLGS #comprehension #evolution #named #online #trust
eTrust: understanding trust evolution in an online world (JT, HG, HL, ADS), pp. 253–261.
KMISKMIS-2012-Kutay #information management #online #trust
Trust Online for Information Sharing (CK), pp. 216–222.
SEKESEKE-2012-HumayunG #empirical #trust #using
An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
SIGIRSIGIR-2012-Khatiban #mining #trust #using
Building reputation and trust using federated search and opinion mining (SK), p. 994.
SACSAC-2012-NoorianFM #trust
Preference-oriented QoS-based service discovery with dynamic trust and reputation management (ZN, MF, SM), pp. 2014–2021.
SACSAC-2012-YaichBJP #adaptation #community #trust
An adaptive and Socially-Compliant Trust Management System for virtual communities (RY, OB, PJ, GP), pp. 2022–2028.
SACSAC-2012-ZhangI #protocol #trust #web #web service #xml
An XML-based protocol for improving trust negotiation between Web Services (YZ, TI), pp. 1947–1954.
OSDIOSDI-2012-KotlaRRSW #data access #hardware #named #using
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
DACDAC-2011-SchmitzLEPA #evaluation #framework #named #performance
TPM-SIM: a framework for performance evaluation of trusted platform modules (JS, JL, JE, DP, NBAG), pp. 236–241.
SIGMODSIGMOD-2011-BajajS #database #hardware #named #privacy
TrustedDB: a trusted hardware based database with privacy and data confidentiality (SB, RS), pp. 205–216.
VLDBVLDB-2011-BajajS #database #hardware #named #outsourcing
TrustedDB: A Trusted Hardware based Outsourced Database Engine (SB, RS), pp. 1359–1362.
ESOPESOP-2011-FournetP #compilation #data flow #security
Compiling Information-Flow Security to Minimal Trusted Computing Bases (CF, JP), pp. 216–235.
ICPCICPC-2011-Ali #analysis #automation #named #retrieval #trust
Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
ICPCICPC-2011-AliGA #requirements #traceability #trust
Trust-Based Requirements Traceability (NA, YGG, GA), pp. 111–120.
MSRMSR-2011-SinhaMS #developer #open source #trust
Entering the circle of trust: developer initiation as committers in open-source projects (VSS, SM, SS), pp. 133–142.
SFMSFM-2011-CostaIMMS #security #trust
Security and Trust (GC, VI, FM, IM, RS), pp. 393–416.
CSCWCSCW-2011-SemaanM #trust
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment (BS, GM), pp. 255–264.
HCIIDGD-2011-ZhangM #trust
Once Broken, Never Fixed? The Impact of Culture and Medium on Repairing Trust in CMC (QZ, NM), pp. 341–350.
EDOCEDOC-2011-FatemiSW #trust
Trust and Business Webs (HF, MvS, RW), pp. 119–128.
ICEISICEIS-J-2011-Shen #comparison #comprehension #social #trust
Understanding User’s Acceptance of Social Shopping Websites: Effects of Social Comparison and Trust (JS), pp. 365–373.
ICEISICEIS-v3-2011-ViriyasitavatM #formal method #requirements #specification #trust #workflow
Formalizing Trust Requirements and Specification in Service Workflow Environments (WV, AM), pp. 196–206.
ICEISICEIS-v4-2011-HuGK #evaluation #modelling #network #trust
Supply Chain Trust Evaluation Model based on Bayesian Network (XH, FG, YK), pp. 712–715.
ICEISICEIS-v4-2011-ShenE #comparison #social #trust
User Acceptance of Social Shopping Sites — Social Comparison and Trust (JS, LBE), pp. 219–224.
CIKMCIKM-2011-Fernandez-LuqueKM #named #retrieval #trust
HealthTrust: trust-based retrieval of you tube’s diabetes channels (LFL, RK, GBM), pp. 1917–1920.
CIKMCIKM-2011-LoSZL #community #mining #network #trust
Mining direct antagonistic communities in explicit trust networks (DL, DS, KZ, EPL), pp. 1013–1018.
ECIRECIR-2011-ShiLH11a #how #question #recommendation #trust
How Far Are We in Trust-Aware Recommendation? (YS, ML, AH), pp. 704–707.
KDDKDD-2011-VydiswaranZR #framework #trust
Content-driven trust propagation framework (VGVV, CZ, DR), pp. 974–982.
RecSysRecSys-2011-GorgoglionePT #behaviour #recommendation #trust
The effect of context-aware recommendations on customer purchasing behavior and trust (MG, UP, AT), pp. 85–92.
SACSAC-2011-BaoCCC #network #trust
Hierarchical trust management for wireless sensor networks and its application to trust-based routing (FB, IRC, MC, JHC), pp. 1732–1738.
SACSAC-2011-SchryenVRH #approach #distributed #formal method #towards #trust
A formal approach towards measuring trust in distributed systems (GS, MV, SR, SMH), pp. 1739–1745.
ICSEICSE-2011-MeneelyW #developer #metric #network #question #trust
Socio-technical developer networks: should we trust our measurements? (AM, LW), pp. 281–290.
SIGMODSIGMOD-2010-GatterbauerS #trust #using
Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
CIAACIAA-2010-TirnaucaT #automaton #identification #query
Types of Trusted Information That Make DFA Identification with Correction Queries Feasible (CT, CIT), pp. 272–281.
CHICHI-2010-CramerESGW #mobile #social #trust
Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
ICMLICML-2010-KimSD #algorithm #scalability
A scalable trust-region algorithm with application to mixed-norm regression (DK, SS, ISD), pp. 519–526.
KDDKDD-2010-ChuaL #generative #modelling #network #online #rating #trust #using
Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
KMISKMIS-2010-FaedAW #trust
The Impact of Trust and Interactivity on Intensifying Customer Loyalty for CRM (AF, AA, CW), pp. 113–120.
RecSysRecSys-2010-JamaliE #matrix #network #recommendation #social #trust
A matrix factorization technique with trust propagation for recommendation in social networks (MJ, ME), pp. 135–142.
RERE-2010-KangJ #dependence
Dependability Arguments with Trusted Bases (EK, DJ), pp. 262–271.
SACSAC-2010-DolevGK #multi #scalability #trust
Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time (SD, NG, MK), pp. 1460–1465.
SACSAC-2010-OCallaghanDC #grid #trust
Evaluating trust in grid certificates (DO, LD, BAC), pp. 1449–1450.
SACSAC-2010-SaadiPB #2d #named #trust
T2D: a peer to peer trust management system based on disposition to trust (RS, JMP, LB), pp. 1472–1478.
SACSAC-2010-YadavS #framework #named #network #trust
iTrust: an integrated trust framework for wireless sensor networks (KY, AS), pp. 1466–1471.
HPCAHPCA-2010-ChampagneL #architecture #scalability
Scalable architectural support for trusted software (DC, RBL), pp. 1–12.
HPDCHPDC-2010-GehaniK #multi #named #trust #verification
Mendel: efficiently verifying the lineage of data modified in multiple trust domains (AG, MK), pp. 227–239.
OSDIOSDI-2010-MahajanSLCADW #named #trust
Depot: Cloud Storage with Minimal Trust (PM, STVS, SL, AC, LA, MD, MW), pp. 307–322.
OSDIOSDI-2010-TangMK #operating system #trust
Trust and Protection in the Illinois Browser Operating System (ST, HM, STK), pp. 17–32.
DACDAC-2009-GuQZ #design #information management
Information hiding for trusted system design (JG, GQ, QZ), pp. 698–701.
CSEETCSEET-2009-Cohen
Software Engineer to Global Leader: Service Provider and Trusted Advisor (EC), p. 2.
CHICHI-2009-CramerESW #adaptation #interactive #trust
Awareness, training and trust in interaction with adaptive spam filters (HSMC, VE, MvS, BJW), pp. 909–912.
CHICHI-2009-KostakosO #assessment #design #trust
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust (VK, IO), pp. 329–332.
CHICHI-2009-ScissorsGGG #similarity #trust
In CMC we trust: the role of similarity (LES, AJG, KG, DG), pp. 527–536.
HCIHCI-AUII-2009-DetweilerB #guidelines #online #towards #trust
Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory (CD, JB), pp. 605–614.
HCIOCSC-2009-Jameson #community #distributed #online #trust
Distributed Leadership, Trust and Online Communities (JJ), pp. 226–235.
ICEISICEIS-DISI-2009-CastilloCGPPV #network #quality #trust
Establishing Trust Networks based on Data Quality Criteria for Selecting Data Suppliers (RPC, IC, IGRdG, MP, MP, EV), pp. 37–42.
ICEISICEIS-SAIC-2009-PetersA #analysis #on the #trust
On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
CIKMCIKM-2009-LiuDRL #named #personalisation #trust
StereoTrust: a group based personalized trust model (XL, AD, KR, EPL), pp. 7–16.
CIKMCIKM-2009-SunWL #injection #trust
Injecting purpose and trust into data anonymisation (XS, HW, JL), pp. 1541–1544.
ICMLICML-2009-RaykarYZJFVBM #learning #multi #trust
Supervised learning from multiple experts: whom to trust when everyone lies a bit (VCR, SY, LHZ, AKJ, CF, GHV, LB, LM), pp. 889–896.
KDDKDD-2009-JamaliE #named #random #recommendation #trust
TrustWalker: a random walk model for combining trust-based and item-based recommendation (MJ, ME), pp. 397–406.
KMISKMIS-2009-SadaranganiA #trust
The Role of Trust in Impact of Leadership on Knowledge Sharing (PS, AA), pp. 266–270.
RecSysRecSys-2009-Golbeck #recommendation #social #trust #tutorial #using
Tutorial on using social trust for recommender systems (JG), pp. 425–426.
RecSysRecSys-2009-JamaliE #network #recommendation #trust #using
Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
RecSysRecSys-2009-MaLK #learning #recommendation #trust
Learning to recommend with trust and distrust relationships (HM, MRL, IK), pp. 189–196.
RecSysRecSys-2009-MoghaddamJEH #feedback #named #recommendation #trust #using
FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
RecSysRecSys-2009-Tavakolifard #trust
Situation-aware trust management (MT), pp. 413–416.
RecSysRecSys-2009-WalterBS #network #personalisation #social #trust
Personalised and dynamic trust in social networks (FEW, SB, FS), pp. 197–204.
SIGIRSIGIR-2009-MaKL #learning #recommendation #social #trust
Learning to recommend with social trust ensemble (HM, IK, MRL), pp. 203–210.
RERE-2009-ElahiY #analysis #requirements #security #trade-off #trust
Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
SACSAC-2009-AhamedKHZ #security #towards #trust
Towards developing a trust-based security solution (SIA, DK, CSH, MZ), pp. 2204–2205.
SACSAC-2009-Huynh #assessment #framework #personalisation #trust
A personalized framework for trust assessment (TDH), pp. 1302–1307.
SACSAC-2009-PengC #collaboration #multi #named #recommendation #trust
iTrustU: a blog recommender system based on multi-faceted trust and collaborative filtering (TCP, ScTC), pp. 1278–1285.
SACSAC-2009-Ries #modelling #representation #trust
Extending Bayesian trust models regarding context-dependence and user friendly representation (SR), pp. 1294–1301.
SACSAC-2009-UddinZ #algorithm #automation #monitoring #named #trust
ATM: an automatic trust monitoring algorithm for service software (MGU, MZ), pp. 1040–1044.
SACSAC-2009-YangSKY #collaboration #modelling #online #trust
Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
DATEDATE-2008-GlasKSMB #architecture #configuration management
A System Architecture for Reconfigurable Trusted Platforms (BG, AK, OS, KDMG, JB), pp. 541–544.
DATEDATE-2008-WolffPBC #analysis #detection #problem #towards
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.
ESOPESOP-2008-CirilloJPR #distributed #named #trust
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract) (AC, RJ, CP, JR), pp. 208–223.
TACASTACAS-2008-LiS
Trusted Source Translation of a Total Function Language (GL, KS), pp. 471–485.
CHICHI-2008-Kindberg #trust
Measuring trust in wi-fi hotspots (TK), pp. 173–182.
CSCWCSCW-2008-KitturSC #trust #wiki
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia (AK, BS, EHC), pp. 477–480.
CSCWCSCW-2008-ScissorsGG #trust
Linguistic mimicry and trust in text-based CMC (LES, AJG, DG), pp. 277–280.
ICEISICEIS-AIDSS-2008-Portillo-RodriguezSVP #community #trust
A Model to Rate Trust in Communities of Practice (JPR, JPS, AV, MP), pp. 193–198.
ICEISICEIS-HCI-2008-IbrahimNM #trust #web
Wisdom on the Web: On Trust, Institution and Symbolisms — A Preliminary Investigation (ENMI, NLMN, SM), pp. 13–20.
ICEISICEIS-SAIC-2008-BninaCNA #question #trust #what
What Can Context Do for Trust in Manets? (EBB, OC, CTN, HKBA), pp. 133–141.
ICEISICEIS-SAIC-2008-DoshiP #network #process
Trusted Information Processes in B2B Networks (CD, LP), pp. 37–44.
ICEISICEIS-SAIC-2008-PetersDW #e-commerce #trust
Consumer-to-Consumer Trust in E-Commerce — Are there Rules for Writing Helpful Product Reviews (GP, MD, RW), pp. 61–66.
CIKMCIKM-2008-KazaiM #information retrieval #social #trust
Trust, authority and popularity in social information retrieval (GK, NMF), pp. 1503–1504.
RecSysRecSys-2008-Lee #named #recommendation #trust
PITTCULT: trust-based cultural event recommender (DHL), pp. 311–314.
SEKESEKE-2008-YangE #multi #trust
Integrating Trust Management into Usage Control in P2P Multimedia Delivery (LY, RKE), pp. 411–416.
SACSAC-2008-AdnaneSBM #behaviour #detection #reasoning #trust
Autonomic trust reasoning enables misbehavior detection in OLSR (AA, RTdSJ, CB, LM), pp. 2006–2013.
SACSAC-2008-AhamedHT #pervasive #trust
Service sharing with trust in pervasive environment: now it’s time to break the jinx (SIA, MMH, NT), pp. 1622–1628.
SACSAC-2008-BistarelliS #multi #network #trust
Propagating multitrust within trust networks (SB, FS), pp. 1990–1994.
SACSAC-2008-Nassiri #3d #e-commerce #trust
Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
SACSAC-2008-UddinZ #named #towards #trust
UMLtrust: towards developing trust-aware software (MGU, MZ), pp. 831–836.
SACSAC-2008-UddinZA #named #trust
CAT: a context-aware trust model for open and dynamic systems (MGU, MZ, SIA), pp. 2024–2029.
SACSAC-2008-VictorCTC #recommendation #trust
Whom should I trust?: the impact of key figures on cold start recommendations (PV, CC, AT, MDC), pp. 2014–2018.
ICLPICLP-2008-BonattiCOS #privacy #security #trust
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
DACDAC-2007-IrvineL #hardware #question
Trusted Hardware: Can It Be Trustworthy? (CEI, KNL), pp. 1–4.
DACDAC-2007-Trimberger #design
Trusted Design in FPGAs (ST), pp. 5–8.
DATEDATE-2007-AarajRRJ #analysis #energy #execution #framework
Energy and execution time analysis of a software-based trusted platform module (NA, AR, SR, NKJ), pp. 1128–1133.
DATEDATE-2007-Casale-RossiSADGMPS #named #product line #question #trust
DFM/DFY: should you trust the surgeon or the family doctor? (MCR, AJS, RCA, AD, CG, PM, DP, JS), pp. 439–442.
DATEDATE-2007-VerbauwhedeS #design #security #trust
Design methods for security and trust (IV, PS), pp. 672–677.
DATEDATE-2007-WagnerB #semantics #trust
Engineering trust with semantic guardians (IW, VB), pp. 743–748.
HTHT-2007-MoganW #case study #information management #trust
A study into user perceptions of information sharing and trust in virtual teams (SM, WW), pp. 43–44.
SCAMSCAM-2007-CeccatoPNCT #slicing
Barrier Slicing for Remote Software Trusting (MC, MDP, JN, CSC, PT), pp. 27–36.
CHICHI-2007-NguyenC #multi #named #trust #video
Multiview: improving trust in group video conferencing through spatial faithfulness (DTN, JC), pp. 1465–1474.
HCIHCI-AS-2007-LowryRH #trust
First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites (PBL, TLR, TH), pp. 77–85.
HCIHIMI-IIE-2007-IbrahimNM #concept #framework #online #trust #web
“Seeing Is Not Believing But Interpreting”, Inducing Trust Through Institutional Symbolism: A Conceptual Framework for Online Trust Building in a Web Mediated Information Environment (ENMI, NLMN, SM), pp. 64–73.
HCIOCSC-2007-XiongYZYL #grid #peer-to-peer #trust
A Trust-Based Reputation System in Peer-to-Peer Grid (ZX, YY, XZ, DY, LL), pp. 228–235.
EDOCEDOC-2007-AlamSZ #framework #modelling
A Model-Driven Framework for Trusted Computing Based Systems (MA, JPS, XZ), pp. 75–86.
ICEISICEIS-EIS-2007-JoyceW #trust
Building, and Losing, Consumer Trust in B2C E-Business (PJ, GW), pp. 55–62.
ICEISICEIS-EIS-2007-SchmidtDSC #ontology #trust
Trust and Reputation Ontologies for Electronic Business (SS, TSD, RS, EC), pp. 308–315.
ECIRECIR-2007-BriggsS #social #trust
Harnessing Trust in Social Search (PB, BS), pp. 525–532.
ICMLICML-2007-LinWK #scalability #trust
Trust region Newton methods for large-scale logistic regression (CJL, RCW, SSK), pp. 561–568.
RecSysRecSys-2007-MassaA #recommendation #trust
Trust-aware recommender systems (PM, PA), pp. 17–24.
SEKESEKE-2007-PatelXG #online #realtime #trust
Real-Time Trust Management in Agent Based Online Auction Systems (RP, HX, AG), pp. 244–250.
SIGIRSIGIR-2007-NieWD #trust #web
Winnowing wheat from the chaff: propagating trust to sift spam from the web (LN, BW, BDD), pp. 869–870.
PPDPPPDP-2007-HristovaTL #analysis #performance #policy #trust
Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
SACSAC-2007-BillhardtHOC #trust
Trust-based service provider selection in open environments (HB, RH, SO, RC), pp. 1375–1380.
SACSAC-2007-NakamuraM #design #linux #trust
Designing a trust chain for a thin client on a live Linux cd (MN, SM), pp. 1605–1606.
SACSAC-2007-Ries #trust
Certain trust: a trust model for users and agents (SR), pp. 1599–1604.
ICLPICLP-2007-CzenkoE #logic programming #trust
Core TuLiP Logic Programming for Trust Management (MC, SE), pp. 380–394.
CASECASE-2006-DongS #grid #research
The Research on Grid E-business System Based on A Trusted Third Part (YD, DS), pp. 640–644.
TACASTACAS-2006-JhaSWR #automaton #trust
Weighted Pushdown Systems and Trust-Management Systems (SJ, SS, HW, TWR), pp. 1–26.
FLOPSFLOPS-2006-PimlottK #trust
Soutei, a Logic-Based Trust-Management System (AP, OK), pp. 130–145.
SOFTVISSOFTVIS-2006-ElmqvistT #in a nutshell
TrustNeighborhoods in a nutshell (NE, PT), pp. 189–190.
CAiSECAiSE-2006-Constantine #design #information management #interactive
Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems (LLC), pp. 20–30.
CAiSECAiSE-2006-Kritis #trust
Dealing with Trust in eGov Services (VK), pp. 18–19.
CAiSECAiSE-2006-Sutcliffe #concept #design #modelling #named #trust
Trust: From Cognition to Conceptual Models and Design (AGS), pp. 3–17.
MODELSMoDELS-2006-MottuBT #approach #component #reuse
Reusable MDA Components: A Testing-for-Trust Approach (JMM, BB, YLT), pp. 589–603.
MODELSMoDELS-2006-MottuBT #approach #component #reuse
Reusable MDA Components: A Testing-for-Trust Approach (JMM, BB, YLT), pp. 589–603.
PPDPPPDP-2006-GorlaHS #trust
Inferring dynamic credentials for rôle-based trust management (DG, MH, VS), pp. 213–224.
SACSAC-2006-BurmesterM #forensics
The advent of trusted computing: implications for digital forensics (MB, JM), pp. 283–287.
SACSAC-2006-HessSS #documentation #personalisation #recommendation
Trust-enhanced visibility for personalized document recommendations (CH, KS, CS), pp. 1865–1869.
SACSAC-2006-KotsovinosW #named #scalability #trust
BambooTrust: practical scalable trust management for global public computing (EK, AW), pp. 1893–1897.
SACSAC-2006-QuerciaLHCB #named #trust
STRUDEL: supporting trust in the dynamic establishment of peering coalitions (DQ, ML, SH, LC, SB), pp. 1870–1874.
SACSAC-2006-RothF #information management #recommendation
Trust-decisions on the base of maximal information of recommended direct-trust (UR, VF), pp. 1898–1901.
SACSAC-2006-WengMG #collaboration #metric #trust
Improving collaborative filtering with trust-based metrics (JW, CM, AG), pp. 1860–1864.
SACSAC-2006-ZuoP #evaluation #trust
Information trustworthiness evaluation based on trust combination (YZ, BP), pp. 1880–1885.
ICSEICSE-2006-NguyenBV #maintenance #outsourcing #trust
Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
ICSEICSE-2006-SuryanarayanaDET #architecture #distributed #modelling #trust
Architectural support for trust models in decentralized applications (GS, MHD, JRE, RNT), pp. 52–61.
OSDIOSDI-2006-Ta-MinLL #configuration management #interface #operating system #trust
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable (RTM, LL, DL), pp. 279–292.
SIGMODSIGMOD-2005-ChaudhuriKR #query #question #sql #trust
When Can We Trust Progress Estimators for SQL Queries? (SC, RK, RR), pp. 575–586.
CAiSECAiSE-2005-MammarRGSG #named #performance #tool support #transaction
Efficient: A Toolset for Building Trusted B2B Transactions (AM, SR, BG, MSI, NG), pp. 430–445.
ICEISICEIS-v3-2005-ZhaoVB #collaboration #distributed #interactive #trust
Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments (WZ, VV, GB), pp. 331–336.
CIKMCIKM-2005-WengMGL #collaboration #trust
Trust-based collaborative filtering (JW, CM, AG, DL), pp. 299–300.
SACSAC-2005-AvesaniMT #recommendation
A trust-enhanced recommender system application: Moleskiing (PA, PM, RT), pp. 1589–1593.
SACSAC-2005-BicakciCT #certification #how #metric #trust
How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
SACSAC-2005-WieringaG #coordination #correctness #design #process #trust
Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
SACSAC-2005-ZuoP #component #trust
Component based trust management in the context of a virtual organization (YZ, BP), pp. 1582–1588.
PPoPPPPoPP-2005-YangBHM #correctness #monitoring #source code #trust #verification
Trust but verify: monitoring remotely executing programs for progress and correctness (SY, ARB, YCH, SPM), pp. 196–205.
WICSAWICSA-2004-SuryanarayanaEHT #architecture #distributed #named #trust
PACE: An Architectural Style for Trust Management in Decentralized Applications (GS, JRE, SAH, RNT), pp. 221–232.
VLDBVLDB-2004-GyongyiGP #web
Combating Web Spam with TrustRank (ZG, HGM, JOP), pp. 576–587.
VLDBVLDB-2004-SkogsrudBCD #lightweight #named #trust
Trust-Serv: A Lightweight Trust Negotiation Service (HS, BB, FC, MQD), pp. 1329–1332.
ESOPESOP-2004-GuttmanTCHRS #trust
Trust Management in Strand Spaces: A Rely-Guarantee Method (JDG, FJT, JAC, JCH, JDR, BTS), pp. 325–339.
STOCSTOC-2004-PrabhakaranS #security
New notions of security: achieving universal composability without trusted setup (MP, AS), pp. 242–251.
CHICHI-2004-SillenceBFH #health #online #trust
Trust and mistrust of online health sites (ES, PB, LF, PRH), pp. 663–670.
ICEISICEIS-v4-2004-SuiAM #approach #e-commerce #email
Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
RERE-2004-HaleyLMN #requirements #security #trust
The Effect of Trust Assumptions on the Elaboration of Security Requirements (CBH, RCL, JDM, BN), pp. 102–111.
SACSAC-2004-SeigneurJ #privacy #trust #ubiquitous
Trust enhanced ubiquitous payment without too much privacy loss (JMS, CDJ), pp. 1593–1599.
FSEFSE-2004-Capra #mobile #trust
Engineering human trust in mobile system collaborations (LC), pp. 107–116.
VMCAIVMCAI-2004-Guttman #protocol #security #trust
Security, Protocols, and Trust (JDG), p. 1.
DocEngDocEng-2003-Fernstrom
Management of trusted citations (CF), pp. 243–245.
SEFMSEFM-2003-CarboneNS #formal method #network #trust
A Formal Model for Trust in Dynamic Networks (MC, MN, VS), p. 54–?.
CHICHI-2003-RiegelsbergerSM #e-commerce #people #trust
Shiny happy people building trust?: photos on e-commerce websites and consumer trust (JR, MAS, JDM), pp. 121–128.
ICEISICEIS-v1-2003-LocMP #approach #component #trust
Try and Patch: An Approach to Improve the Trust in Software Components (PTXL, PM, GP), pp. 505–508.
ICEISICEIS-v3-2003-DooKK #authentication
Trusted Authentication Between User and Machine (SD, JK, EK), pp. 577–581.
ICEISICEIS-v4-2003-PerkinsJBC #collaboration #information management #trust
Building Supply Chain Relationships with Knowledge Management: Engineering Trust in Collaborative Systems (JP, AKJ, LB, SC), pp. 63–70.
ICEISICEIS-v4-2003-StanojevicTV #named
FIDES — A Financial Decision Aid That Can Be Trusted (MS, VT, SV), pp. 103–110.
ICEISICEIS-v4-2003-Vasiu #security #trust #web #web service
Security Web Services Based on Trust (LV), pp. 369–376.
PPDPPPDP-2003-NielsenK #towards #trust
Towards a formal notion of trust (MN, KK), pp. 4–7.
PADLPADL-2003-LiM #constraints #datalog #trust
DATALOG with Constraints: A Foundation for Trust Management Languages (NL, JCM), pp. 58–73.
SACSAC-2003-CazierSL #privacy #trust
Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
ICSEICSE-2003-Meyer #challenge #component
The Grand Challenge of Trusted Components (BM), pp. 660–667.
SOSPSOSP-2003-GarfinkelPCRB #framework #named #virtual machine
Terra: a virtual machine-based platform for trusted computing (TG, BP, JC, MR, DB), pp. 193–206.
SOSPSOSP-2003-LieTH #hardware #implementation #operating system
Implementing an untrusted operating system on trusted hardware (DL, CAT, MH), pp. 178–192.
CHICHI-2002-BosOGOW #development #trust
Effects of four computer-mediated communications channels on trust development (NB, JSO, DG, GMO, ZW), pp. 135–140.
CHICHI-2002-ZhengVBOO #process #social #trust
Trust without touch: jumpstarting long-distance trust with initial social activities (JZ, ESV, NB, JSO, GMO), pp. 141–146.
SACSAC-2002-AljarehR #collaboration #multi #network #security
A task-based security model to facilitate collaboration in trusted multi-agency networks (SA, BNR), pp. 744–749.
ASPLOSASPLOS-2002-KirovskiDP
Enabling trusted software integrity (DK, MD, MP), pp. 108–120.
OSDIOSDI-2002-AdyaBCCCDHLTW #named #reliability
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment (AA, WJB, MC, GC, RC, JRD, JH, JRL, MT, RW), pp. 1–14.
CBSECBSE-2001-Schmidt #assembly #automation #component #predict #towards
Trusted Components: Towards Automated Assembly with Predictable Properties (HWS), p. 14.
CBSECBSE-2001-Voas #certification #component #trust
Component Trust and Certification (keynote) (JV), p. 1.
CSEETCSEET-2001-DuleyMV #industrial #trust
Teamwork and Trust: Universities, industry and the professional software engineer (RD, SPM, DV), pp. 153–161.
CHICHI-2001-BickmoreC #implementation #relational #trust
Relational agents: a model and implementation of building user trust (TWB, JC), pp. 396–403.
ICEISICEIS-v2-2001-CostaOS #integration
A Trusted Brokering Service for PKI Interoperability and Thin-Clients Integration (CMAC, JLO, AS), pp. 1179–1182.
ICEISICEIS-v2-2001-GochenouerT #internet #privacy #trust
Privacy Audits and Trust: The Internet Dilemma (JEG, MLT), pp. 905–909.
CIKMCIKM-2001-AbererD #information management #trust
Managing Trust in a Peer-2-Peer Information System (KA, ZD), pp. 310–317.
TOOLSTOOLS-USA-2001-Meyer01a #component
Building Trusted Components (BM), p. 347.
PPDPPPDP-2001-HepburnW #trust #π-calculus
Trust in the π-Calculus (MH, DW), pp. 103–114.
RERE-2001-GansJKLEFM #approach #modelling #network #requirements #trust
Requirements Modeling for Organization Networks: A (Dis-)Trust-Based Approach (GG, MJ, SK, GL, LE, CF, MM), pp. 154–165.
CSCWCSCW-2000-GreenspanGWB #communication #trust
Interpersonal trust and common ground in electronically mediated communication (SG, DG, DMW, AB), pp. 251–260.
TOOLSTOOLS-EUROPE-2000-BaudryHT #component #named #search-based
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification (BB, VLH, YLT), pp. 108–119.
ICSEICSE-2000-HeinemanCFMSS #component #re-engineering #trust
Component-based software engineering and the issue of trust (GTH, WTC, JSF, AM, JRS, MS), pp. 661–664.
OSDIOSDI-2000-MaheshwariVS #database #how
How to Build a Trusted Database System on Untrusted Storage (UM, RV, WS), pp. 135–150.
EDOCEDOC-1999-ArshadAS #corba #e-commerce #framework #transaction
A CORBA based framework for trusted E-commerce transactions (KMA, YA, MYS), pp. 18–25.
TOOLSTOOLS-EUROPE-1999-Jezequel #component
Trusted Components (JMJ), p. 422.
TOOLSTOOLS-USA-1999-CrichtonDW #data access #mobile #trust
When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
POPLPOPL-1999-RielyH #mobile #trust #type system
Trust and Partial Typing in Open Systems of Mobile Agents (JR, MH), pp. 93–104.
CHICHI-1998-Rocco #trust
Trust Breaks Down in Electronic Contexts But Can Be Repaired by Some Initial Face-to-Face Contact (ER), pp. 496–502.
CSCWCSCW-1998-HouseBS #information management #set #trust
Cooperative Knowledge Work and Practices of Trust: Sharing Environmental Planning Data Sets (NAVH, MHB, LRS), pp. 335–343.
ICSEICSE-1998-DevanbuFS #re-engineering
Techniques for Trusted Software Engineering (PTD, PWLF, SGS), pp. 126–135.
ASEASE-1997-DevanbuS #automation #hardware #research #using #verification
Research Directions for Automated Software Verification: Using Trusted Hardware (PTD, SGS), pp. 274–279.
ASEKBSE-1996-Hall
Trusting Your Assistant (RJH), p. 9.
SASSAS-1995-PalsbergO #trust #λ-calculus
Trust in the λ-Calculus (JP, ), pp. 314–329.
AdaTRI-Ada-1994-Aldrich #ada #architecture
Secured Systems and Ada: A Trusted System Software Architecture (MA), pp. 282–292.
ICSEICSE-1992-Bjorner #experience
Trusted Computing Systems: The ProCoS Experience (DB), pp. 15–34.
LICSLICS-1987-FaginH #communication
I’m OK if You’re OK: On the Notion of Trusting Communication (RF, JYH), pp. 280–292.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.