Author of the publication

Using Trust in Recommender Systems: An Experimental Analysis.

, and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 221-235. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Resilient Backbones for Multihop Wireless Networks., , , and . IEEE Trans. Mob. Comput., 7 (11): 1349-1362 (2008)SeCloak: ARM Trustzone-based Mobile Peripheral Control., , , and . CoRR, (2020)What a mesh: understanding the design tradeoffs for streaming multicast., , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 85-86 (2009)Privacy-preserving microbiome analysis using secure computation., , , , and . Bioinform., 32 (12): 1873-1879 (2016)Scalable secure group communication over IP multicast., and . IEEE J. Sel. Areas Commun., 20 (8): 1511-1527 (2002)Persona: an online social network with user-defined privacy., , , , and . SIGCOMM, page 135-146. ACM, (2009)Privacy Capsules: Preventing Information Leaks by Mobile Apps., , , and . MobiSys, page 399-411. ACM, (2016)Are Virtualized Overlay Networks Too Much of a Good Thing?, , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 225-231. Springer, (2002)Systems-compatible incentives., , and . GAMENETS, page 100-106. IEEE, (2009)Channel Access Throttling for Overlapping BSS Management., , , , and . ICC, page 1-6. IEEE, (2009)