Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things
There is an increasing demand for Internet of Things (IoT) networks consisting of resource-
constrained devices executing increasingly complex applications. Due to these resource …
constrained devices executing increasingly complex applications. Due to these resource …
Trust trackers for computation offloading in edge-based IoT networks
Wireless Internet of Things (IoT) devices will be deployed to enable applications such as
sensing and actuation. These devices are typically resource-constrained and are unable to …
sensing and actuation. These devices are typically resource-constrained and are unable to …
[HTML][HTML] Information management for trust computation on resource-constrained IoT devices
Abstract Resource-constrained Internet of Things (IoT) devices are executing increasingly
sophisticated applications that may require computational or memory intensive tasks to be …
sophisticated applications that may require computational or memory intensive tasks to be …
Reasoning and interaction for social artificial intelligence
Current work on multi-agent systems at King's College London is extensive, though largely
based in two research groups within the Department of Informatics: the Distributed Artificial …
based in two research groups within the Department of Informatics: the Distributed Artificial …
Proposal for an index measuring the reputation of open data portals: The Odapri
M Ortiz-de-Urbina-Criado… - Profesional de …, 2023 - revista.profesionaldelainformacion …
The demand for open data has led to the creation and the availability of numerous portals
releasing data. However, a large percentage of them are not properly designed for …
releasing data. However, a large percentage of them are not properly designed for …
T-VLC: A Trust Model for Virtual Learning Communities
L Chamba-Eras, A Arruarte… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In the context of virtual learning communities (VLCs), where the participants may not know
each other, it is necessary to have a mechanism to help when deciding who to work with and …
each other, it is necessary to have a mechanism to help when deciding who to work with and …
Improving trust and reputation assessment with dynamic behaviour
C Player, N Griffiths - The Knowledge Engineering Review, 2020 - cambridge.org
Trust between agents in multi-agent systems (MASs) is critical to encourage high levels of
cooperation. Existing methods to assess trust and reputation use direct and indirect past …
cooperation. Existing methods to assess trust and reputation use direct and indirect past …
Attributes and Dimensions of Trust in Secure Systems
M Bradbury, D Prince, V Marcinkiewicz… - Proceedings of the 12th …, 2022 - dl.acm.org
What is it to be trusted? This is an important question as trust is increasingly placed in a
system and the degree to which a system is trusted is increasingly being assessed …
system and the degree to which a system is trusted is increasingly being assessed …
Impact of social media on e-reputation–analysis of Marriott hotel chain in Algeria
N Bessouh, Y Grari… - Management and …, 2024 - management-journal.org.ua
This research aims to examine the impact of social media on the e-reputation of Marriott
hotels in Algeria, while focusing on electronic word-of-mouth. The main purpose is to …
hotels in Algeria, while focusing on electronic word-of-mouth. The main purpose is to …
[HTML][HTML] Experience-based access control in UbiComp: A new paradigm
NA Mhetre, AV Deshpande, PN Mahalle - Journal of Computer and …, 2022 - scirp.org
Experience is a sociological concept and builds over time. In a broader sense, the human-
centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing …
centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing …