Stem trustworthi$ (all stems)
45 papers:
- VLDB-2015-DongGMDHLSZ #knowledge-based #trust #web
- Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources (XLD, EG, KM, VD, WH, CL, SS, WZ), pp. 938–949.
- SAC-2015-DihegoSO #component
- Constructive extensibility of trustworthy component-based systems (JD, AS, MVMO), pp. 1808–1814.
- DAC-2014-SullivanBZZJ #functional #hardware #identification #named
- FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness (DS, JB, GZ, SZ, YJ), p. 4.
- CSCW-2014-KnowlesHBDHRW #design
- Trustworthy by design (BK, MH, LB, ND, JH, MR, JW), pp. 1060–1071.
- LCT-TRE-2014-Schulz #internet
- Creating Universal Designed and Trustworthy Objects for the Internet of Things (TS), pp. 206–214.
- SCSM-2014-HardjonoDC #design #framework #on the #self
- On the Design of Trustworthy Compute Frameworks for Self-organizing Digital Institutions (TH, PD, JHC), pp. 342–353.
- FSE-2014-Cleland-HuangRM #lightweight #traceability
- Achieving lightweight trustworthy traceability (JCH, MR, PM), pp. 849–852.
- OSDI-2014-WangLZCT #framework #interpreter #kernel #named
- Jitk: A Trustworthy In-Kernel Interpreter Infrastructure (XW, DL, NZ, AC, ZT), pp. 33–47.
- DAC-2013-ZhangRJ #network #towards
- Towards trustworthy medical devices and body area networks (MZ, AR, NKJ), p. 6.
- HCI-UC-2013-RossvollF #social #social media
- Trustworthy and Inclusive Identity Management for Applications in Social Media (THR, LF), pp. 68–77.
- EDOC-2013-GallegeGHR #contract #monitoring #trust #using
- Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
- EDOC-2013-MukkamalaHS #adaptation #graph #towards
- Towards Trustworthy Adaptive Case Management with Dynamic Condition Response Graphs (RRM, TTH, TS), pp. 127–136.
- KDD-2013-GeGLZ #estimation #learning #multi
- Multi-source deep learning for information trustworthiness estimation (LG, JG, XL, AZ), pp. 766–774.
- SEKE-2013-WangWTZ #evaluation #named #network #recommendation #trust
- STERS: A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network (S) (YW, JW, YT, JZ), pp. 322–325.
- ECOOP-2013-CutsemM #invariant
- Trustworthy Proxies — Virtualizing Objects with Invariants (TVC, MSM), pp. 154–178.
- WICSA-ECSA-2012-KuzZBSX #approach #architecture #effectiveness
- An Architectural Approach for Cost Effective Trustworthy Systems (IK, LZ, LB, MS, XX), pp. 325–328.
- KDD-2012-KohaviDFLWX #online
- Trustworthy online controlled experiments: five puzzling outcomes explained (RK, AD, BF, RL, TW, YX), pp. 786–794.
- KDD-2012-WuWCT #detection #hybrid #named #recommendation
- HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation (ZW, JW, JC, DT), pp. 985–993.
- PLEASE-2012-LiY #product line
- Enhance value by building trustworthy software-reliant system of systems from software product lines (DL, YY), pp. 13–16.
- ICTSS-2012-BrauerPS #modelling #performance #testing #tool support
- Efficient and Trustworthy Tool Qualification for Model-Based Testing Tools (JB, JP, US), pp. 8–23.
- CSCW-2011-HoZ
- i-sensor inference model for assessing trustworthiness in computer-mediated communications (SMH, XZ), pp. 645–648.
- OOPSLA-2011-DarulovaK #scala
- Trustworthy numerical computation in Scala (ED, VK), pp. 325–344.
- SOSP-2011-SirerBRSWWS #architecture #logic
- Logical attestation: an authorization architecture for trustworthy computing (EGS, WdB, PR, AS, KW, DW, FBS), pp. 249–264.
- CSCW-2010-Toma #online #visual notation
- Perceptions of trustworthiness online: the role of visual and textual information (CLT), pp. 13–22.
- ICEIS-AIDSS-2010-UrbanoRO #assessment
- Refining the Trustworthiness Assessment of Suppliers through Extraction of Stereotypes (JU, APR, ECO), pp. 85–92.
- ICEIS-J-2010-UrbanoRO10a #metric #using
- Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
- CIKM-2010-DondioB #comparison
- Comparison of six aggregation strategies to compute users’ trustworthiness (PD, SB), pp. 1773–1776.
- SEKE-2010-ZhaoXWX #named #repository #resource management #reuse
- TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse (JZ, BX, YW, YX), pp. 752–756.
- SAC-2010-SkopikSD #interactive
- Trustworthy interaction balancing in mixed service-oriented systems (FS, DS, SD), pp. 799–806.
- ICLP-2010-Lopez10 #modelling #process
- Models for Trustworthy Service and Process Oriented Systems (HAL), pp. 270–276.
- FM-2009-RamosSM #component #development
- Systematic Development of Trustworthy Component Systems (RR, AS, AM), pp. 140–156.
- CHI-2009-KostakosO #assessment #design #trust
- Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust (VK, IO), pp. 329–332.
- RE-2009-LongLYJ #approach #evaluation #requirements #security
- AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
- ECSA-2008-MohammadA #architecture #component #named
- TADL — An Architecture Description Language for Trustworthy Component-Based Systems (MM, VSA), pp. 290–297.
- FM-2008-LintelmanRLS #formal method #security
- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
- CSCW-2008-KitturSC #trust #wiki
- Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia (AK, BS, EHC), pp. 477–480.
- ICEIS-J-2008-IbrahimNM08a #web
- “Fact or Fiction?” Imposing Legitimacy for Trustworthy Information on the Web: A Qualitative Inquiry (ENMI, NLMN, SM), pp. 297–306.
- DAC-2007-IrvineL #hardware #question
- Trusted Hardware: Can It Be Trustworthy? (CEI, KNL), pp. 1–4.
- VLDB-2006-MitraHW #keyword
- Trustworthy Keyword Search for Regulatory-Compliant Record Retention (SM, WWH, MW), pp. 1001–1012.
- SAC-2006-ZuoP #evaluation #trust
- Information trustworthiness evaluation based on trust combination (YZ, BP), pp. 1880–1885.
- SIGMOD-2005-ZhuH
- Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records (QZ, WWH), pp. 395–406.
- ICSE-2003-FredrikssonG
- Trustworthy and sustainable operations in marine environments (MF, RG), pp. 806–807.
- CADE-2002-SchneckN #approach #scalability
- A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code (RRS, GCN), pp. 47–62.
- HCI-CCAD-1999-MulkenAM #empirical #interface
- An empirical study on the trustworthiness of life-like interface agents (SvM, EA, JM), pp. 152–156.
- TAV-1989-Gerhart #assessment #formal method #summary
- Preliminary Summary: FM89 Assessment of Formal Methods for Trustworthy Computer Systems (SLG), pp. 152–155.