Exploring local community structures in large networks

F Luo, JZ Wang, E Promislow - Web Intelligence and Agent …, 2008 - content.iospress.com
In this paper, three new algorithms, a greedy algorithm, a KL-like algorithm, and an add-all
algorithm, are proposed to find local optimal community structures in large networks starting …

The state of the art in critical infrastructure protection: a framework for convergence

AA Ghorbani, E Bagheri - International Journal of Critical …, 2008 - inderscienceonline.com
The protection of critical infrastructure systems has recently become a major concern for
many countries. This is due to the effect of these systems on the daily lives of all citizens and …

Trust, untrust, distrust and mistrust–an exploration of the dark (er) side

S Marsh, MR Dibben - International conference on trust management, 2005 - Springer
There has been a lot of research and development in the field of computational trust in the
past decade. Much of it has acknowledged or claimed that trust is a good thing. We think it's …

Thinking about trust: People, process, and place

S Marsh, T Atele-Williams, A Basu, N Dwyer, PR Lewis… - Patterns, 2020 - cell.com
This brief paper is about trust. It explores the phenomenon from various angles, with the
implicit assumptions that trust can be measured in some ways, that trust can be compared …

Examining trust, forgiveness and regret as computational concepts

S Marsh, P Briggs - Computing with social trust, 2009 - Springer
The study of trust has advanced tremendously in recent years, to the extent that the goal of a
more unified formalisation of the concept is becoming feasible. To that end, we have begun …

A weighted‐tree similarity algorithm for multi‐agent systems in e‐business environments

VC Bhavsar, H Boley, L Yang - Computational Intelligence, 2004 - Wiley Online Library
A tree similarity algorithm for match‐making of agents in e‐Business environments is
presented. Product/service descriptions of seller and buyer agents are represented as node …

Protecting privacy of sensitive data dissemination using active bundles

LB Othmane, L Lilien - … Congress on Privacy, Security, Trust and …, 2009 - ieeexplore.ieee.org
The solution for protecting data privacy proposed in this paper-called Active Bundles-
protects sensitive data from their disclosure to unauthorized parties and from unauthorized …

Information trust model

T Atele-Williams, S Marsh - Cognitive Systems Research, 2023 - Elsevier
Abstract Information has been an essential element in the development of collaborative and
cooperative frameworks. From decision making to the attainment of different goals, people …

[PDF][PDF] xTrust: A Scalable Trust Management Infrastructure.

M Branchaud, S Flinn - Pst, 2004 - Citeseer
This paper introduces xTrust, a general purpose security framework that supports a wide
range of applications and security mechanisms in a way that makes trust highly visible. It …

[PDF][PDF] The AgentMatcher architecture applied to power grid transactions

R Sarno, L Yang, VC Bhavsar, H Boley - Proceedings of the First …, 2003 - academia.edu
The number of complex transactions in a power grid to determine economical ways of
satisfying power demands given a set of power plants has increased significantly …