Trust-based decision-making for smart and adaptive environments
暂无分享,去创建一个
[1] Stephen Marsh,et al. Trust in Distributed Artificial Intelligence , 1992, MAAMAW.
[2] Touradj Ebrahimi,et al. Comparative Study of Trust Modeling for Automatic Landmark Tagging , 2013, IEEE Transactions on Information Forensics and Security.
[3] Bernt Schiele,et al. Towards improving trust in context-aware systems by displaying system confidence , 2005, Mobile HCI.
[4] Keith Cheverst,et al. Exploring Issues of User Model Transparency and Proactive Behaviour in an Office Environment Control System , 2005, User Modeling and User-Adapted Interaction.
[5] Jonathan Klein,et al. Computers that recognise and respond to user emotion: theoretical and practical implications , 2002, Interact. Comput..
[6] Eve E. Hoggan,et al. Tailoring Feedback to Users' Actions in a Persuasive Game for Household Electricity Conservation , 2012, PERSUASIVE.
[7] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[8] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[9] Joanna Lumsden. Triggering trust: to what extent does the question influence the answer when evaluating the perceived importance of trust triggers? , 2009, BCS HCI.
[10] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[11] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[12] Yue Xu,et al. A Review of Trust in Online Social Networks to Explore New Research Agenda , 2010, International Conference on Internet Computing.
[13] John D. Lee,et al. Trust in Automation: Designing for Appropriate Reliance , 2004 .
[14] Zheng Yan,et al. Trust Modeling and Management: From Social Trust to Digital Trust , 2008 .
[15] Uwe Hansmann,et al. Pervasive Computing , 2003 .
[16] Elisabeth André,et al. The Automatic Trust Management of Self-Adaptive Multi-Display Environments , 2012 .
[17] Adrian Friday,et al. Look Back before Leaping Forward : Four Decades of Domestic-Energy Inquiry , 2022 .
[18] Elisabeth André,et al. Managing user trust for self-adaptive ubiquitous computing systems , 2010, MoMM.
[19] Anind K. Dey,et al. Toolkit to support intelligibility in context-aware applications , 2010, UbiComp.
[20] Elisabeth André,et al. Trust-based Decision-making for the Adaptation of Public Displays in Changing Social Contexts , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[21] Tsvi Kuflik,et al. When user modeling intersects software engineering: the info-bead user modeling approach , 2015, User Modeling and User-Adapted Interaction.
[22] Valtteri Niemi,et al. Effects of Displaying Trust Information on Mobile Application Usage , 2010, ATC.
[23] Rino Falcone,et al. Trust Theory: A Socio-Cognitive and Computational Model , 2010 .
[24] George Vogiatzis,et al. A probabilistic model for trust and reputation , 2010, AAMAS.
[25] Paul C. van Oorschot,et al. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts , 2014, USENIX Security Symposium.
[26] Julita Vassileva,et al. Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.
[27] CheverstKeith,et al. Exploring Issues of User Model Transparency and Proactive Behaviour in an Office Environment Control System , 2005 .
[28] Shambhu J. Upadhyaya,et al. Towards Modeling Trust Based Decisions: A Game Theoretic Approach , 2007, ESORICS.
[29] Phoebe Sengers,et al. Mapping the landscape of sustainable HCI , 2010, CHI.
[30] Marco Jahn,et al. Saving energy at work: the design of a pervasive game for office spaces , 2012, MUM.
[31] Elisabeth André,et al. Personalization of Content on Public Displays Driven by the Recognition of Group Context , 2012, AmI.
[32] Barry Smyth,et al. Trust in recommender systems , 2005, IUI.
[33] Xingshe Zhou,et al. Autonomic and Trusted Computing , 2010, Lecture Notes in Computer Science.
[34] Katia P. Sycara,et al. Trust Decision-Making in Multi-Agent Systems , 2011, IJCAI.
[35] Isaac Woungang,et al. Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..
[36] Antonio Krüger,et al. ReflectiveSigns: Digital Signs That Adapt to Audience Attention , 2009, Pervasive.
[37] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[38] Sibel Adali,et al. Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.
[39] Sonia Bergamaschi,et al. Agents and Peer-to-Peer Computing - 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers , 2008, AP2PC.
[40] Elisabeth André,et al. Trust Management of Ubiquitous Multi-Display Environments , 2012, Ubiquitous Display Environments.
[41] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[42] Alfred Kobsa,et al. Dimensionality of information disclosure behavior , 2013, Int. J. Hum. Comput. Stud..
[43] Jörg Hähner,et al. Trustworthy Organic Computing Systems: Challenges and Perspectives , 2010, ATC.
[44] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[45] Deborah L. McGuinness,et al. Toward establishing trust in adaptive agents , 2008, IUI '08.
[46] Masahiro Fujita,et al. i/k-Contact: A context-aware user authentication using physical social trust , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[47] Moshe Tennenholtz,et al. Artificial Social Systems , 1992, Lecture Notes in Computer Science.