Using latent semantic analysis to improve access to textual information
CHI '88 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Ad Hoc Wireless Networks: Protocols and Systems
Ad Hoc Wireless Networks: Protocols and Systems
SETI@home: an experiment in public-resource computing
Communications of the ACM
Grid Computing: Making the Global Infrastructure a Reality
Grid Computing: Making the Global Infrastructure a Reality
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
The Knowledge Engineering Review
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
netWorker - Cloud computing: PC functions move onto the web
Hi-index | 0.00 |
We propose a mechanism for the acquisition of information from potentially unreliable sources. Our mechanism addresses the case where the acquired information cannot be verified. The idea is to intersperse questions (“challenges”) for which the correct answers are known. By evaluating the answers to these challenges, probabilistic conclusions about the correctness of the unverifiable information can be drawn. Less challenges need to be used if an information provider has shown to be trustworthy. Our approach can resist collusion and shows great promise for various application scenarios such as grid-computing or peer-to-peer networks.