Author of the publication

The effect of malicious peers in a gossip-based reputation system.

, , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 201-205. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Cost of Trust in the Dynamics of Best Attachment., , , and . Comput. Informatics, 34 (1): 167-184 (2015)A Network-Based Analysis of a Worksite Canteen Dataset., , , , and . Big Data Cogn. Comput., 5 (1): 11 (2021)Communities unfolding in multislice networks., , , and . CoRR, (2016)Cloud in Mobile Platforms: Managing Authentication/Authorization., , , , , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 361-372. Springer, (2019)A Heuristic to Explore Trust Networks Dynamics., , , and . IDC, volume 511 of Studies in Computational Intelligence, page 67-76. Springer, (2013)Gain the Best Reputation in Trust Networks., , , and . IDC, volume 382 of Studies in Computational Intelligence, page 213-218. Springer, (2011)The Assessment of Expertise in Social Networks., , , and . IDC, volume 237 of Studies in Computational Intelligence, page 53-62. Springer, (2009)Trusting Evaluation by Social Reputation., , , and . IDC, volume 162 of Studies in Computational Intelligence, page 75-84. Springer, (2008)An Adaptive Algorithm for Geofencing., , , , and . AITM/ISM@FedCSIS, volume 346 of Lecture Notes in Business Information Processing, page 115-135. Springer, (2018)Hardware/software synthesis of formal specifications in codesign of embedded systems., , and . ACM Trans. Design Autom. Electr. Syst., 5 (3): 399-432 (2000)