Learn More
In a type of interactions over the Internet, a user (the subject) is dependent on another user (the target), but not vice versa. The subject should therefore form an opinion about the target, before possibly initiating an interaction. The scenario wherein a subject only relies on information obtained from past interactions with the target, is well-studied(More)
BACKGROUND Cryptosporidium parvum is an important cause of epidemic diarrhea. Few studies have assessed whether serological evidence of prior infection in adults is related to a reduced occurrence of enteric illness. METHODS Serum samples and enteric illness event data were obtained in 2000 and 2001 from 326 people served by 1 of 2 unfiltered surface(More)
PURPOSE Cryptosporidium oocysts are commonly detected in surface-derived drinking water, however, the public health significance of these findings is unclear. This study compared the evidence of prior Cryptosporidium infection for people drinking water derived from surface versus ground water sources. METHODS This study measured serological responses to(More)
In this paper, a reliable, fast and robust approach for static hand gesture recognition in the domain of a human-robot interaction system is presented. The method is based on computing the likelihood of different existing gesture-types and assigning a probability to every type by using Bayesian inference rules. For this purpose, two classes of geometrical(More)
Unfair rating attacks to trust systems can affect the accuracy of trust evaluation when trust ratings (recommendations) about trustee agents are sought by truster agents from others (advisor agents). A robust trust system should remain accurate, even under the worst-case attacks which yield the least useful recommendations. In this work, we base on(More)
  • Tim Muller
  • 2010
The meaning assigned to the word 'trust' is diverse. We present a formalism that allows various interpretations of trust. To this end, we introduce terms that specify the observations of agents, called connections. Then we apply epistemic semantics to reason about the knowledge of agents. We allow specifications of interpretations of trust in terms of(More)
Trust systems assist in dealing with users who may betray one another. Cunning users (attackers) may attempt to hide the fact that they betray others, deceiving the system. Trust systems that are difficult to deceive are considered more robust. To formally reason about robustness, we formally model the abilities of an attacker. We prove that the attacker(More)
There is a need for robust and effective trust management. Different security problems result in different requirements to the design of trust management, and the existing attacks in trust management for security are yet to be solved. In this paper, we first propose a framework to classify desired properties of trust management for each type of security(More)
Unfair rating attacks happen in existing trust and reputation systems, lowering the quality of the systems. There exists a formal model that measures the maximum impact of independent attackers [Wang et al., 2015] – based on information theory. We improve on these results in multiple ways: (1) we alter the methodology to be able to reason about colluding(More)