Computational trust

Results: 86



#Item
21Science / Reputation management / Sociology / Accountability / Social psychology / Trust / Bayesian game / Extensive-form game / Investor / Game theory / Ethics / Law

Bayesian Model of Behaviour in Economic Games Brooks King-Casas Computational Psychiatry Unit Baylor College of Medicine. Houston, TXUSA

Add to Reading List

Source URL: www.gatsby.ucl.ac.uk

Language: English - Date: 2009-04-07 02:54:08
22X.509 / Certificate authority / Extended Validation Certificate / Public key certificate / Public key infrastructure / Computational trust / HTTP Secure / Phishing / Self-signed certificate / Cryptography / Key management / Public-key cryptography

Trust Views for the Web PKI Johannes Braun, Florian Volk, Johannes Buchmann and Max M¨ uhlh¨auser Technische Universit¨ at Darmstadt/CASED Hochschulstraße 10, 64283 Darmstadt, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 06:36:08
23Applied mathematics / Computational biology / Bioinformatics / Mathematical and theoretical biology / Human Genome Project / Genome project / Genomics / Wellcome Trust Sanger Institute / Yves A. Lussier / Biology / Science / Wellcome Trust

Principal Investigator/Program Director (Last, first, middle): _______________________ JJ BIOGRAPHICAL SKETCH Provide the following information for the key personnel in the order listed on Form Page 2.

Add to Reading List

Source URL: www.esp.org

Language: English - Date: 2010-05-11 22:27:09
24Computational science / Genome project / Computational biology / Sequence alignment / Sequence assembly / Wellcome Trust Sanger Institute / Genomics / Beijing Genomics Institute / Short Oligonucleotide Analysis Package / Bioinformatics / Science / Biology

Bioinformatics and Computational Biology Faculty Candidate Research Seminar Tuesday, March 31st at 3:40pm

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2015-03-27 15:33:28
25Science / Peter Willett / Mike Lynch / Computational chemistry / CSA Trust / Cheminformatics

About the Trust Chemical Structure Association Trust

Add to Reading List

Source URL: www.csa-trust.org

Language: English - Date: 2010-12-01 10:10:50
26Internet culture / Depository Trust & Clearing Corporation / Computational biology / MIT Computer Science and Artificial Intelligence Laboratory / Finance / Doctoral Training Centre / Financial system / Financial economics / Andrew Odlyzko

BULLETIN SPRING | 05 Boost for Bioinformatics and

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:29:16
27Chemical nomenclature / Identifiers / Encodings / International Chemical Identifier / Computational chemistry / Chemical table file / InChI Trust / Cryptographic hash function / VE / Chemistry / Science / Cheminformatics

IUPAC International Chemical Identifier (InChI) Programs InChI version 1, software version[removed]September[removed]User’s Guide Last revision date: September 12, 2011

Add to Reading List

Source URL: www.inchi-trust.org

Language: English - Date: 2014-10-20 03:20:55
28Genomics / Genome project / Human genome / Wellcome Trust Sanger Institute / Molecular evolution / Functional genomics / Computational biology / Structural genomics / Comparative genomics / Biology / Genetics / Bioinformatics

RUSSIAN ACADEMY OF SCIENCES SIBERIAN BRANCH INSTITUTE OF CYTOLOGY AND GENETICS LABORATORY OF THEORETICAL GENETICS PROCEEDINGS

Add to Reading List

Source URL: www.bionet.nsc.ru

Language: English - Date: 2001-10-08 22:35:35
29Partner Institute for Computational Biology / Germany / Max Planck Society / Peter Gruss / Chinese Academy of Sciences / Lu Yongxiang / Science and technology in Germany / Biology / Cell biology

BCAS Vol.27 No[removed]Learn from Each Other in Friendship and Trust

Add to Reading List

Source URL: english.cas.cn

Language: English - Date: 2014-12-19 11:28:53
30Computing / Public safety / Distributed computing architecture / Mobile agent / Computer security / .mobi / Security guard / Proxy server / Computational trust / Security / Crime prevention / Computer network security

Mobile Agent security using Proxy-agents and Trusted domains ∗ Nikola Mitrovi´c

Add to Reading List

Source URL: webdiis.unizar.es

Language: English - Date: 2009-02-16 04:52:11
UPDATE