390 results on '"Wierzbicki, Adam"'
Search Results
102. On the Modelling of the Computer Security Impact on the Reputation Systems
103. Collaborative Problem Solving in Emergency Situations: Lessons Learned from a Rescue Mission
104. Equitable aggregations and multiple criteria analysis
105. From Computational to Human Trust: Problems, Methods and Applications of Trust Management
106. Theory of Trust and Fairness
107. Trust Management
108. Trust and Fairness Management in P2P and Grid Systems
109. Trust and Fairness in Open, Distributed Systems
110. ProtoTrust: An Environment for Improved Trust Management in Internet Auctions
111. Maintaining Redundancy in Peer-to-Peer Storage Systems
112. Conclusion
113. Emotion Aware Mobile Application
114. Introduction
115. Fairness Management
116. Comment Classification for Internet Auction Platforms
117. Bioleaching using Acidithiobacillus Thiooxidans - an option for element recovery from highly alkaline waste incineration ash?
118. Interdisciplinary Matchmaking: Choosing Collaborators by Skill, Acquaintance and Trust
119. Supporting Collaboration and Creativity Through Mobile P2P Computing
120. Spiral of Hatred: Social Effects in Buyer-Seller Cross-Comments Left on Internet Auctions
121. Whom to Believe? Understanding and Modeling Brain Activity in Source Credibility Evaluation
122. Digging for the truth: the case for active annotation in evaluating the credibility of online medical information (Preprint)
123. Digging for the truth: the case for active annotation in evaluating the credibility of online medical information (Preprint)
124. True Or False: How Does Our Brain Decide About Truth?
125. Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games
126. Application-Oriented Evaluation of Measurement Estimation
127. Maastrichtian climate changes – the calcareous nannofossil record from flysch deposits of the Outer Carpathians
128. A distributed WWW cache
129. A filtering algorithm for Web caches
130. Web Content Credibility
131. The Logical Structure of Intentional Anonymity
132. Correction to: older adults and hackathons: a qualitative study
133. Older adults and hackathons
134. Guidelines towards better participation of older adults in software development processes using a new SPIRAL method and participatory approach
135. Computing controversy: Formal model and algorithms for detecting controversy on Wikipedia and in search queries
136. Older adults and hackathons: a qualitative study
137. LivingLab PJAIT
138. Turned 70?
139. THE LOGICAL STRUCTURE OF INTENTIONAL ANONYMITY.
140. Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings
141. Web Content Classification Using Distributions of Subjective Quality Evaluations
142. Credibility as Signal: Predicting Evaluations of Credibility by a Signal-Based Model
143. Multi-hard Problems in Uncertain Environment
144. Analysis of Questionnaire Results Using Metric Methods
145. Report on the WebQuality 2015 Workshop
146. Security Trade-Off and Energy Efficiency Analysis in Wireless Sensor Networks
147. Session details: WebQuality 2015
148. e ‐Commerce Reputation Systems
149. On the Modelling of the Influence of Access Control Management to the System Security and Performance
150. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.