Empirical Study of the Model Generalization for Argument Mining in Cross-Domain and Cross-Topic Settings. | 0 | 0.34 | 2022 |
A Hybrid Approach for Stock Market Prediction Using Financial News and Stocktwits. | 0 | 0.34 | 2021 |
Managing a pool of rules for credit card fraud detection by a Game Theory based approach | 1 | 0.35 | 2020 |
Supplier Impersonation Fraud Detection using Bayesian Inference | 0 | 0.34 | 2020 |
RACOON++: A Semi-Automatic Framework for the Selfishness-aware Design of Cooperative Systems | 2 | 0.37 | 2019 |
A Transparent Referendum Protocol with Immutable Proceedings and Verifiable Outcome for Trustless Networks. | 0 | 0.34 | 2019 |
Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps. | 0 | 0.34 | 2019 |
The Long Road to Computational Location Privacy: A Survey. | 8 | 0.45 | 2018 |
Exploratory Study of Privacy Preserving Fraud Detection. | 0 | 0.34 | 2018 |
A Reputation System Resilient Against Colluding And Malicious Adversaries In Mobile Participatory Sensing Applications | 0 | 0.34 | 2017 |
Analysing Selfishness Flooding with SEINE | 1 | 0.35 | 2017 |
Efficient Worker Selection Through History-Based Learning In Crowdsourcing | 1 | 0.36 | 2017 |
Balcon: Backward Loss Concealment Mechanism For Scalable Video Dissemination In Opportunistic Networks | 0 | 0.34 | 2016 |
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval. | 1 | 0.35 | 2016 |
Adaptive Location Privacy with ALP. | 3 | 0.42 | 2016 |
SimAttack: private web search under fire. | 3 | 0.38 | 2016 |
A decentralized fault tolerance model based on level of performance for grid environment | 1 | 0.36 | 2016 |
4PR: Privacy preserving routing in mobile delay tolerant networks. | 0 | 0.34 | 2016 |
Task Characterization for an Effective Worker Targeting in Crowdsourcing | 0 | 0.34 | 2016 |
A Trustless Privacy-Preserving Reputation System | 14 | 0.67 | 2016 |
Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction | 0 | 0.34 | 2015 |
PEAS: Private, Efficient and Accurate Web Search | 5 | 0.41 | 2015 |
A delay and cost balancing protocol for message routing in mobile delay tolerant networks | 9 | 0.56 | 2015 |
PEAS: Private, Efficient and Accurate Web Search | 0 | 0.34 | 2015 |
Time Distortion Anonymization for the Publication of Mobility Data with High Utility | 0 | 0.34 | 2015 |
Trust management and reputation systems in mobile participatory sensing applications: A survey. | 6 | 0.40 | 2015 |
Privacy-Preserving Publication Of Mobility Data With High Utility | 2 | 0.38 | 2015 |
Reliable fault tolerant model for grid computing environments | 1 | 0.35 | 2014 |
Towards efficient and accurate privacy preserving web search. | 2 | 0.45 | 2014 |
Many-player inspection games in networked environments | 3 | 0.43 | 2013 |
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model | 7 | 0.50 | 2013 |
A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks | 5 | 0.40 | 2013 |
Centrality-based peer rewiring in semantic overlay networks: Short paper | 0 | 0.34 | 2013 |
Enhancing video viewing-experience in opportunistic networks based on SVC, an experimental study. | 1 | 0.36 | 2013 |
A latency hiding framework for enhanced ubiquitous access to big data in a constrained digital ecosystem: application to digital medical archives | 0 | 0.34 | 2012 |
Landmark-assisted location and tracking in outdoor mobile network | 4 | 0.44 | 2012 |
A self-regulating protocol for efficient routing in mobile delay tolerant networks | 4 | 0.38 | 2012 |
User Centric Replication Approach to Maintain Data Availability in MANET. | 1 | 0.35 | 2011 |
Leveraging node centrality and regularity for efficient routing in mobile peer-to-peer networks | 1 | 0.37 | 2011 |
A Privacy Preserving Reputation Protocol for Web Service Provider Selection | 1 | 0.48 | 2011 |
Evaluating the Robustness of Publish/Subscribe Systems | 5 | 0.57 | 2011 |
Towards a Model for Multimedia Dataspaces. | 0 | 0.34 | 2011 |
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. | 4 | 0.56 | 2010 |
CReaM: User-Centric Replication Model for Mobile Environments | 5 | 0.42 | 2010 |
Interest-Awareness for Information Sharing in MANETs | 1 | 0.36 | 2010 |
Mobility-Awareness for Information Sharing in MANETs | 1 | 0.37 | 2010 |
PASMi: self-adaptive Photo Annotation and Sharing Middleware of Mobile Ad-hoc Networks | 1 | 0.35 | 2010 |
T2D: a peer to peer trust management system based on disposition to trust | 7 | 0.49 | 2010 |
Elimination of Subjectivity from Trust Recommendation | 9 | 0.57 | 2009 |
L'Elimination de la subjectivité dans la recommandation de confiance | 0 | 0.34 | 2009 |