Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,828,422 papers from all fields of science
Search
Sign In
Create Free Account
Advogato
Known as:
AdvoWiki
, Advogato.org
Advogato is an online community and social networking site dedicated to free software development, and was created by Raph Levien.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Blog
Online community
PageRank
Raph Levien
Expand
Broader (1)
Reputation management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
On the Human Factor Consideration for VANETs Security Based on Social Networks
Kerrache Chaker Abdelaziz
,
N. Lagraa
,
A. Benslimane
,
C. Calafate
,
Juan-Carlos Cano
IEEE International Conference on Communications…
2018
Corpus ID: 51876934
Ensuring the required trustiness among communicating peers is an important task in Vehicular Adhoc Networks (VANETs), especially…
Expand
2017
2017
Collusion-resistant Worker Selection in Social Crowdsensing Systems
Masood Niazi Torshiz
,
Haleh Amintoosi
2017
Corpus ID: 54640868
The main idea behind social crowdsensing is to leverage social friends as crowdworkers to participate in crowdsensing tasks. A…
Expand
2013
2013
Trust Inference Computation for Online Social Networks
Sana Hamdi
,
A. Bouzeghoub
,
Alda Lopes Gançarski
,
S. Yahia
12th IEEE International Conference on Trust…
2013
Corpus ID: 18328819
Trust has become one of the most important issues in online social Networks. In fact, the basic idea of trust systems is to help…
Expand
2010
2010
Efficient privacy preserving reputation protocols inspired by secure sum
Omar Hasan
,
E. Bertino
,
L. Brunie
Eighth International Conference on Privacy…
2010
Corpus ID: 11359853
The secure sum protocol is a well-known protocol for computing the sum of private inputs from distributed entities such that the…
Expand
2009
2009
Trust- and Location-Based Recommendations for Tourism
A. Hinze
,
Qiu Quan
OTM Conferences
2009
Corpus ID: 1558730
Recommender systems in a travel guide suggest touristic sites a user may like. Typically, people are more willing to trust…
Expand
2009
2009
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments
Omar Hasan
,
L. Brunie
,
J. Pierson
Industrial Cyber-Physical Systems
2009
Corpus ID: 1232490
There are a number of models for access control in pervasive environments that are based on trust propagation. Iterative…
Expand
2008
2008
Analysis of a Trust-Based Access Control Model for Ubiquitous Environments
Omar Hasan
,
L. Brunie
,
Insa Lyon
2008
Corpus ID: 9510243
There are a number of models for access control in ubiquitous environments that are based on trust propagation. Iterative…
Expand
Review
2007
Review
2007
The Culture of Open Source Computing
A. Holliger
2007
Corpus ID: 2942677
While women's representation in computing is low, it is even lower in open source computing – only 1.5% of all Open Source…
Expand
2006
2006
A Graph Theoretic Framework for Trust - From Local to Global
P. Sant
,
C. Maple
International Conference on Information…
2006
Corpus ID: 15337275
Traditional approaches to trust, be it in agent-based societies, or within a more theoretical framework often consider trust to…
Expand
2003
2003
An e-education collaboration model on the open source idea. The collaboration model
Gregor Eibl
14th International Workshop on Database and…
2003
Corpus ID: 12184244
Based on the open source software model, successful and sophisticated software projects were realized. Part of the success stems…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE