Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Management without Reputation in P2P Games.. SECRYPT, page 126-134. INSTICC Press, (2006)Practical trust management without reputation in peer-to-peer games., and . Multiagent and Grid Systems, 3 (4): 411-428 (2007)Internet Cache Location and Design of Content Delivery Networks.. NETWORKING Workshops, volume 2376 of Lecture Notes in Computer Science, page 69-82. Springer, (2002)Guest editors' introduction: Disruptive networking with peer-to-peer systems., and . Comput. Commun., 31 (3): 419-422 (2008)Guest editors' introduction: Foundation of peer-to-peer computing., and . Comput. Commun., 31 (2): 187-189 (2008)Simulations of Credibility Evaluation and Learning in a Web 2.0 Community., , , and . ICAISC (2), volume 8468 of Lecture Notes in Computer Science, page 373-384. Springer, (2014)From Computational to Human Trust: Problems, Methods and Applications of Trust Management.. SocInfo, volume 6984 of Lecture Notes in Computer Science, page 338. Springer, (2011)Verifying social network models of Wikipedia knowledge community, , , and . Information Sciences, (2016)Efficient and Correct Trust Propagation Using CloseLook., and . Web Intelligence, page 676-681. IEEE Computer Society, (2010)Cognitive Limitations of Older E-Commerce Customers in Product Comparison Tasks., , , , and . INTERACT (3), volume 12934 of Lecture Notes in Computer Science, page 646-656. Springer, (2021)