نتایج جستجو برای: generalized trust
تعداد نتایج: 224617 فیلتر نتایج به سال:
Most of the current content of the Web is understandable only to humans. The Semantic Web envisions solving this problem by adding structure and semantic information to the content of Webpages, enabling machines to understand and reason about information on the web in a generalized manner. This paper presents some important issues that need to be resolved if the vision of the global Semantic We...
In light of the new interest in remote application hosting, or application service provision (ASP), this study aims at empirically testing the ASP Intention Model (AIM), by surveying 143 decision makers in organizations. The model, based on institutional theories, reflects factors affecting organizational intention to adopt remote application hosting: perceived business benefits of ASP, perceiv...
There is no question that the accident at the Fukushima Daiichi Nuclear Power Plant in 2011, after the 9.0magnitude earthquake that shook Japan and the subsequent tsunami, had a major impact not only on the safety of the people and the environment surrounding the site, but also on Japanese economy due to the affectation on the energy and agriculture sectors. However, the effects of the accident...
BACKGROUND Through the nearly three decades that have passed since the Alma Ata conference on Primary Health Care, a wide range of global health initiatives and ideas have been advocated to improve the health of people living in developing countries. The issues raised in the Primary Health Care concept, the Structural Adjustment Programmes and the Health Sector Reforms have all influenced healt...
In this report a method for the design centering of analog circuits, based on worstcase distances (WCD) is presented. In order to keep the linearization error small, only the WCDs and not the strongly nonlinear objective function itself is linearized. For the resulting nonlinear trust-region problem the generalized boundary curve (GBC) is derived as a method to determine a solution with a good ...
Cryptography and Authentication is the traditional approach to provide security in WSNs(Wireless Sensor Networks). However, that conventional approach is not sufficient for the unique characteristics and novel misbehaviors encountered in WSNs. In this paper, we use a general tool which has been used in economics, statistics and data analysis. With this approach, we propose a task-based trust ma...
Peer to Peer (P2P) networks have been widely used in recent years in various of applications such as file sharing, content distribution, and e-commerce. At the same time, there were a number of attacks on the reputation mechanisms in these P2P networks. These attacks intend to manipulate or misuse the reputation systems so that ratings on certain peers are biased or ignored. Many approaches in ...
Individual social capital is increasingly considered to be an important determinant of an individual's health. This study examines the extent to which individual social capital is associated with self-rated health and the extent to which individual social capital mediates t.he relationship between neighbourhood deprivation and self-rated health in an English sample. Individual social capital wa...
It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید