نتایج جستجو برای: generalized trust

تعداد نتایج: 224617  

2004
Terje Wahl

Most of the current content of the Web is understandable only to humans. The Semantic Web envisions solving this problem by adding structure and semantic information to the content of Webpages, enabling machines to understand and reason about information on the web in a generalized manner. This paper presents some important issues that need to be resolved if the vision of the global Semantic We...

2007
Tsipi Heart

In light of the new interest in remote application hosting, or application service provision (ASP), this study aims at empirically testing the ASP Intention Model (AIM), by surveying 143 decision makers in organizations. The model, based on institutional theories, reflects factors affecting organizational intention to adopt remote application hosting: perceived business benefits of ASP, perceiv...

2013
Alba L. Pineda-Solano Victor H. Carreto-Vazquez Sam Mannan Mary Kay

There is no question that the accident at the Fukushima Daiichi Nuclear Power Plant in 2011, after the 9.0magnitude earthquake that shook Japan and the subsequent tsunami, had a major impact not only on the safety of the people and the environment surrounding the site, but also on Japanese economy due to the affectation on the energy and agriculture sectors. However, the effects of the accident...

2010
Øystein E Olsen

BACKGROUND Through the nearly three decades that have passed since the Alma Ata conference on Primary Health Care, a wide range of global health initiatives and ideas have been advocated to improve the health of people living in developing countries. The issues raised in the Primary Health Care concept, the Structural Adjustment Programmes and the Health Sector Reforms have all influenced healt...

1999
Robert Schwencker

In this report a method for the design centering of analog circuits, based on worstcase distances (WCD) is presented. In order to keep the linearization error small, only the WCDs and not the strongly nonlinear objective function itself is linearized. For the resulting nonlinear trust-region problem the generalized boundary curve (GBC) is derived as a method to determine a solution with a good ...

2009
Haiguang Chen

Cryptography and Authentication is the traditional approach to provide security in WSNs(Wireless Sensor Networks). However, that conventional approach is not sufficient for the unique characteristics and novel misbehaviors encountered in WSNs. In this paper, we use a general tool which has been used in economics, statistics and data analysis. With this approach, we propose a task-based trust ma...

2016
Wei Li

Peer to Peer (P2P) networks have been widely used in recent years in various of applications such as file sharing, content distribution, and e-commerce. At the same time, there were a number of attacks on the reputation mechanisms in these P2P networks. These attacks intend to manipulate or misuse the reputation systems so that ratings on certain peers are biased or ignored. Many approaches in ...

Journal: :Social science & medicine 2012
Pieter-Paul Verhaeghe Gindo Tampubolon

Individual social capital is increasingly considered to be an important determinant of an individual's health. This study examines the extent to which individual social capital is associated with self-rated health and the extent to which individual social capital mediates t.he relationship between neighbourhood deprivation and self-rated health in an English sample. Individual social capital wa...

It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید