Author of the publication

Exploring Trust Propagation Behaviors in Online Communities.

, , , and . NBiS, page 361-367. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A web-based e-learning system for increasing study efficiency by stimulating learner's motivation., , , and . Inf. Syst. Frontiers, 8 (4): 297-306 (2006)Priority Based Wireless Communications for Health Monitoring on Highways., , and . J. Interconnect. Networks, 9 (4): 337-349 (2008)Performance Evaluation of Reactive and Proactive Protocols for Ad-Hoc Sensor Networks Using Different Radio Models., , , , and . J. Interconnect. Networks, 8 (4): 387-405 (2007)Requirements for Trustworthy Artificial Intelligence - A Review., , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 105-115. Springer, (2020)Artificial intelligence control for trust-based detection of attackers in 5G social networks., , , and . Comput. Intell., (February 2024)Trustworthy AI Explanations as an Interface in Medical Diagnostic Systems., , and . NBiS, volume 526 of Lecture Notes in Networks and Systems, page 119-130. Springer, (2022)Hierarchical Communications for Battlefields., , and . AINA Workshops (2), page 690-695. IEEE Computer Society, (2007)M3PS: A JXTA-based Multi-platform P2P System and its Web Application Tools., , , and . IJWIS, 2 (3/4): 187-196 (2006)Implementation of new functions for improving learners motivation in a web-based e-learning system., , , , and . iiWAS, page 359-366. ACM, (2008)A P2P system based on JXTA-overlay and its application for end-device control., , , , , and . MoMM, page 364-369. ACM, (2008)