×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [trust graph]
[part 2]
469 views
Computer Security Key Management. Introduction We distinguish between a session key and a interchange key ( long term key ). The session key is associated
216 views
From your FODAVA leadership team after visiting NVAC 1 That visualization and data analysis are not by themselves the final result or the purpose of VA,
215 views
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University
226 views
Measuring Behavioral Trust in Social Networks Sibel Adali, et al. IEEE International Conference on Intelligence and Security Informatics Presented by:
217 views
Measuring Behavioral Trust in Social Networks
65 views