Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Management without Reputation in P2P Games.. SECRYPT, page 126-134. INSTICC Press, (2006)Precious Time: Understanding Social Stratification in the Knowledge Society Through Time Allocation., , and . CoRR, (2017)Simulations of Credibility Evaluation and Learning in a Web 2.0 Community., , , and . ICAISC (2), volume 8468 of Lecture Notes in Computer Science, page 373-384. Springer, (2014)From Computational to Human Trust: Problems, Methods and Applications of Trust Management.. SocInfo, volume 6984 of Lecture Notes in Computer Science, page 338. Springer, (2011)Guest editors' introduction: Foundation of peer-to-peer computing., and . Comput. Commun., 31 (2): 187-189 (2008)Guest editors' introduction: Disruptive networking with peer-to-peer systems., and . Comput. Commun., 31 (3): 419-422 (2008)Internet Cache Location and Design of Content Delivery Networks.. NETWORKING Workshops, volume 2376 of Lecture Notes in Computer Science, page 69-82. Springer, (2002)Improving computational trust representation based on Internet auction traces., , , , and . Decis. Support Syst., 54 (2): 929-940 (2013)Verifying social network models of Wikipedia knowledge community., , , and . Inf. Sci., (2016)Practical trust management without reputation in peer-to-peer games., and . Multiagent Grid Syst., 3 (4): 411-428 (2007)