Exploring local community structures in large networks
In this paper, three new algorithms, a greedy algorithm, a KL-like algorithm, and an add-all
algorithm, are proposed to find local optimal community structures in large networks starting …
algorithm, are proposed to find local optimal community structures in large networks starting …
The state of the art in critical infrastructure protection: a framework for convergence
The protection of critical infrastructure systems has recently become a major concern for
many countries. This is due to the effect of these systems on the daily lives of all citizens and …
many countries. This is due to the effect of these systems on the daily lives of all citizens and …
Trust, untrust, distrust and mistrust–an exploration of the dark (er) side
S Marsh, MR Dibben - International conference on trust management, 2005 - Springer
There has been a lot of research and development in the field of computational trust in the
past decade. Much of it has acknowledged or claimed that trust is a good thing. We think it's …
past decade. Much of it has acknowledged or claimed that trust is a good thing. We think it's …
Thinking about trust: People, process, and place
This brief paper is about trust. It explores the phenomenon from various angles, with the
implicit assumptions that trust can be measured in some ways, that trust can be compared …
implicit assumptions that trust can be measured in some ways, that trust can be compared …
Examining trust, forgiveness and regret as computational concepts
The study of trust has advanced tremendously in recent years, to the extent that the goal of a
more unified formalisation of the concept is becoming feasible. To that end, we have begun …
more unified formalisation of the concept is becoming feasible. To that end, we have begun …
A weighted‐tree similarity algorithm for multi‐agent systems in e‐business environments
A tree similarity algorithm for match‐making of agents in e‐Business environments is
presented. Product/service descriptions of seller and buyer agents are represented as node …
presented. Product/service descriptions of seller and buyer agents are represented as node …
Protecting privacy of sensitive data dissemination using active bundles
The solution for protecting data privacy proposed in this paper-called Active Bundles-
protects sensitive data from their disclosure to unauthorized parties and from unauthorized …
protects sensitive data from their disclosure to unauthorized parties and from unauthorized …
Information trust model
T Atele-Williams, S Marsh - Cognitive Systems Research, 2023 - Elsevier
Abstract Information has been an essential element in the development of collaborative and
cooperative frameworks. From decision making to the attainment of different goals, people …
cooperative frameworks. From decision making to the attainment of different goals, people …
[PDF][PDF] xTrust: A Scalable Trust Management Infrastructure.
M Branchaud, S Flinn - Pst, 2004 - Citeseer
This paper introduces xTrust, a general purpose security framework that supports a wide
range of applications and security mechanisms in a way that makes trust highly visible. It …
range of applications and security mechanisms in a way that makes trust highly visible. It …
[PDF][PDF] The AgentMatcher architecture applied to power grid transactions
The number of complex transactions in a power grid to determine economical ways of
satisfying power demands given a set of power plants has increased significantly …
satisfying power demands given a set of power plants has increased significantly …