Apparatus and methods for reputation-based filtering on a communication networkA method for providing reputation information concerning a domain is disclosed. The domain may include one or more devices on a network. The method may include retrieving a first reputation pertaining to a first function ...
Reputation-based Worker Filtering in CrowdsourcingSrikanth Jagabathula1Lakshminarayanan Subramanian2,3Ashwin Venkataraman2,31Department of IOMS, NYU Stern School of Business2Department of Computer Science, New York University3CTED, New York University Abu Dhabisjagabat@stern.nyu.edu{lakshmi,ashwin}@cs...
Advs: a reputation-based model on filtering spit over p2p-voip networks," The Journal of Supercomputing, pp. 1-18, 2013.F. Wang, F. R. Wang, B. Huang, and L. T. Yang, "Advs: a reputation-based model on filtering spit over p2p-voip networks," The Journal of Supercomputing, vol...
filteringDataminingRecommendationsystemReputationpopularitySocialbookmarkingPurpose -- Social bookmarking is a system which allows users to share, organise, search and manage bookmarks of web resources. However, with the rapid growth in the production of online documents, people are facing the problem of ...
Direct trust feedback Group decision-making 1. Introduction In recent years, with the rapid development of communication technology and social network, it is more convenient toshare informationand exchange services, and hence increasing interactions among individuals and resulting in profound and interestin...
Mobile ad hoc networks (MANETs) are formed by a set of mobile nodes without relying on a preexisting infrastructure. In MANETs, ad hoc nodes should count on intermediate nodes to relay messages between two distant nodes. However, due to the inherent dyna
Apple on Tuesday was reassigned a patent from Topsy Labs, the social analytics firm it purchased in 2013, covering a computer search system that cuts through the noise often found in crowdsourced recommendation services by surfacing search results based
The goal is to help you findfree tools on OSINT, cyber intelligence, ethical hacking, penetration testing, sandbox and reputation, malware analysis, web security, cybersecurity, security advisory, advanced search platforms and more! Tools listed inthis pageare FREE (or partially free) and can be...
To improve the security of the consensus process, RVC is designed with a filtering algorithm that uses the historical reputation to remove malicious nodes, which can prevent the consensus process from being destroyed. Under the above enhancements, RVC can realize a faster and safer consensus process...
6073165Filtering computer network messages directed to a user's e-mail box based on user defined filters, and forwarding a filtered message to the user's receiver2000-06-06Narasimhan et al.709/206 6061718Electronic mail delivery system in wired or wireless communications system2000-05-09Nelson709...