Browse Results

Showing 52,501 through 52,525 of 55,671 results

Troubleshooting Xcode

by Magno Urbano

Troubleshooting Xcode is a handbook for software developers of all levels creating applications for iOS and OS X using both Objective-C and Swift. If you''ve struggled in the past to make Xcode work as expected, to solve problems that defy logic, and to understand Xcode''s misleading or cryptic error messages and unexpected crashes, Troubleshooting Xcode is for you. Troubleshooting Xcode is great for the developer wanting to extend his or her knowledge about obscure problems and limitations involving the use of Xcode, Objective-C, and Swift as well as how to use automation to increase productivity and make some repetitive tasks easier. What you''ll learn Learn about some classical bugs and limitations of iOS, OS X, and Xcode and how to solve or avoid them. Know when you should never use Storyboards for your OS X application. Discover several workarounds you can use to bypass some of the hardest problems you may face. Know how to use scripts to automate repetitive tasks like the creation of in- app purchase packages or icons for your application. Understand how you can create images that are better compressed and smaller. Learn how to avoid falling into common pitfalls. Learn how to use C to workaround some Objective-C limitations. Who this book is for iOS and OS X developers who need to troubleshoot problems and limitations with Xcode. Developers with all levels of experience will find helpful information in Troubleshooting Xcode. Table of Contents Xcode crashing when opening a project file The identity used to sign the executable is invalid Xcode fails to compile and blames "SBPartialInfo" No matching provisioning profiles found Compressing images better than Photoshop Creating packages for in-app purchases Reduce up to 75% of the compiling time Declaring impossible "constants" in Objective-C Concurrency with Core Data Creating icons for your apps from Terminal UINavigationBar tint not working Debugging an insanely hard Quartz error Adding objects to a mutable array concurrently The app is damaged and can''t be opened Application failing to obtain a receipt Classes with the same name on different targets A case against Base Internationalization Checking for missing Localizable. strings You are declaring your NSString wrong CocoaPods: /Manifest. lock: No such file or directory Asset Catalogs bug App crashing without giving you clues NSUserDefaults not working for a sandboxed app Interface elements not updating Find and replace using regex Extracting a dictionary from an array Magical way of counting elements on an array OS X app not launching with the correct size Detecting the application target Disabling a method Deprecating a method Xcode "beachballs" when opening a project UIButton not grayed out Catching memory corruption SpriteKit crashing on didBeginContact: SpriteKit object not respecting boundaries A case against using Storyboards for Cocoa apps UIView Classes with independent rounded corners Making NSViews compatible with UIViews Detect with the UIPickerView stops spinning "Insane" NSDates Localizing the application name Centering views horizontally with Auto Layout Elements grayed out on Storyboard after copying Debugging Core Data "The package does not contain an Info. plist" Check the version of an app on the App Store Power tips: Beyond Xcode

Troux Enterprise Architecture Solutions

by Richard J. Reese

The book introduces topics in a broad context using a "best practices" model. Then the Troux Transformation Platform is used to provide concrete examples for the concepts. The book reads more like a novel than a manual, but provides insight and background to topics. In addition to clear language, many illustrations and graphics are included to enhance concepts. The book is not intended to be a user manual nor does it take the place of online content best managed by websites. This book is for the IT professional interested in using the rich content available in IT management systems to drive business value. Anyone involved in managing IT systems, defining IT architectures, managing IT standards, responsible for Enterprise Architecture, or the Enterprise Program Management Office, will enjoy reading this book. In addition, users of the Troux Transformation Platform or IT professionals implementing the TOGAFTM methodology will find this book a useful reference tool.

A Truck Full of Money: One Man's Quest to Recover from Great Success

by Tracy Kidder

"A perfectly executed, exquisitely reported parable of the Internet age and the wild, mad adventure that is start-up culture."--Charles Duhigg Fortune, mania, genius, philanthropy--the bestselling author of Mountains Beyond Mountains gives us the inspiring story of Paul English, the founder of Kayak.com and Lola. Tracy Kidder, the "master of the nonfiction narrative" (The Baltimore Sun) and author of the bestselling classic The Soul of a New Machine, now tells the story of Paul English, a kinetic and unconventional inventor and entrepreneur, who as a boy rebelled against authority. Growing up in working-class Boston, English discovers a medium for his talents the first time he sees a computer. As a young man, despite suffering from what would eventually be diagnosed as bipolar disorder, he begins his pilgrim's journey through the ups and downs in the brave new world of computers. Relating to the Internet as if it's an extension of his own mind, he discovers that he has a talent for conceiving innovative enterprises and building teams that can develop them, becoming "a Pied Piper" of geeks. His innovative management style, success, and innate sense of fair play inspire intense loyalty. Early on, one colleague observes: "Someday this boy's going to get hit by a truck full of money, and I'm going to be standing beside him." Yet when English does indeed make a fortune, when the travel website Kayak is sold for almost two billion dollars--the first thing he thinks about is how to give the money away: "What else would you do with it?" The second thing he thinks is, What's next? With the power of a consummate storyteller, Tracy Kidder casts a fresh, critical, and often humorous eye on the way new ideas and new money are reshaping our culture and the world. A Truck Full of Money is a mesmerizing portrait of an irresistibly endearing man who is indefatigable, original, and as unpredictable as America itself. Advance praise for A Truck Full of Money"A perfectly executed, exquisitely reported parable of the Internet age, and the wild, mad adventure that is start-up culture."--Charles Duhigg "A Truck Full of Money brings us into unknown spaces of the complex workings of the mind--of a brilliant software engineer, of this new decade, of the brutal/fast business of technology, of stunning privilege, and of one man's efforts to put his fortune to humane use."--Adrian Nicole LeBlanc"The story of [an] entrepreneur's remarkable life [and] the new American economy and the technological world that built it. More engrossing work from a gifted practitioner of narrative nonfiction."--Kirkus ReviewsFrom the Hardcover edition.

Truffle Quick Start Guide: Learn the fundamentals of Ethereum development

by Nikhil Bhaskar

Develop, test, and deploy decentralized applications for Ethereum platformKey FeaturesBuild your first Ethereum Dapp with Truffle: the most popular Ethereum development frameworkBuild, compile, and deploy smart contracts in your development environmentEmbrace Blockchains and utilize it to create new generation of secured and scalable appsBook DescriptionTruffle is a world-class development environment, testing framework and asset pipeline for Ethereum, aiming to make life as an Ethereum developer easier.If you are a web developer wanting to try your hand at developing Dapps with Truffle, then this is the book for you. This book will teach you to write smart contracts and build Dapps with Truffle. You will begin with covering the basics of Truffle, briefly explaining how it integrates Solidity and Web3, in orderto start building a mini decentralized application. Also, you will dive into migration, testing and integrating Truffle with the use of popular JavaScript frameworks. Lastly, you will ship your decentralized application and package it into a product. Moreover, you will go through the best practices in Truffle,so as to increase your proficiency in building Dapps with Truffle.By the end of the book, you will be able to write smart contracts and build decentralized applications with Truffle on Ethereum blockchains. What you will learnUnderstand the fundamentals of Truffle and Web3Build a decentralized application with Truffle, while choosing the correct Ethereum clientConnect your Dapp to Ethereum clients including Geth, Parity, and GanacheMigrate and test your Dapp with the correct networks such as Ropsten and RinkebyPackage a decentralized application into a user-friendly product by integrating Truffle with JavaScript frameworks such as Angular, React and VueExplore tools including Ethereum Package Manager, the Registrar and browser wallets, and exploit third-party smart contract libraries.Evaluate the common migration pitfalls and how to mitigate themWho this book is forThis book is for web developers who are interested in the new world blockchain. Some basic understanding of JavaScript and web services is required. No prior knowledge of Decentralized applications or blockchain is required.

Truly, Madly, Like Me: The glorious and hilarious new rom-com from the smash-hit bestseller (Starting Over)

by Jo Watson

'A hilarious, laugh-out-loud romance that is a breath of fresh air' 5* reader reviewFrom the author of the 100,000 copy-selling rom-com, Love to Hate You! No one makes you laugh like Jo Watson! If you love by Mhairi McFarlane, Sophie Ranald, Sophie Kinsella and Paige Toon, you'll LOVE Jo's rom-coms!Preorder Jo's hilarious and heartfelt new rom-com, Just The Way I Am, now! Just search: 9781472265586Readers are raving about Truly, Madly, Like Me!'A masterclass in character development... This is truly a novel for the times we live in. I would highly recommend' 5* reader review'Another absolutely gorgeous read by one of my favourite authors...completely impossible to put down' 5* reader review'I can't heap any more praise on this book, it just made me feel so happy! I laughed, I cried, I smiled, but most of all I LOVED!!' 5* reader reviewShe's used to faking it. Now it's time to get real.It all started with a faulty elevator... When social media influencer Frankie Paulson's followers turn on her after an embarrassing public break-up with her perfect #couplegoals boyfriend, and she almost plummets to her death with two strangers in a faulty elevator, all she wants to do is hide. A town with no internet is the ideal sanctuary, but Frankie has never done anything without sharing it on one of many apps she can't live without. After all, surely it's much more satisfying to take the perfect photograph of her breakfast than eat it? When Fate, in the form of a new four-legged companion, plays a hand in keeping her in the town, Frankie starts to make tentative but genuine connections with the people she meets. Suddenly every rule she's been living by seems far less meaningful and she begins to wonder if her apparently #blessed life wasn't as real as she thought...Love funny, romantic stories? You don't want to miss Jo Watson:'The perfect choice for fans of romantic comedies' Gina's Bookshelf'It was amazing, it was hilarious' Rachel's Random Reads'A brilliant read from beginning to end' Hopeless Romantics'Sitting here open mouthed in disbelief at just how wonderful this book is' Rachel's Random Reads 'A stunning heart-warming read' Donna's Book Blog

Trump and the Media

by Pablo Boczkowski Zizi Papacharissi

The election of Donald Trump and the great disruption in the news and social media. Donald Trump's election as the 45th President of the United States came as something of a surprise—to many analysts, journalists, and voters. The New York Times's The Upshot gave Hillary Clinton an 85 percent chance of winning the White House even as the returns began to come in. What happened? And what role did the news and social media play in the election? In Trump and the Media, journalism and technology experts grapple with these questions in a series of short, thought-provoking essays. Considering the disruption of the media landscape, the disconnect between many voters and the established news outlets, the emergence of fake news and “alternative facts,” and Trump's own use of social media, these essays provide a window onto broader transformations in the relationship between information and politics in the twenty-first century. The contributors find historical roots to current events in Cold War notions of "us" versus "them," trace the genealogy of the assault on facts, and chart the collapse of traditional news gatekeepers. They consider such topics as Trump's tweets (diagnosed by one writer as “Twitterosis”) and the constant media exposure given to Trump during the campaign. They propose photojournalists as visual fact checkers (“lessons of the paparazzi”) and debate whether Trump's administration is authoritarian or just authoritarian-like. Finally, they consider future strategies for the news and social media to improve the quality of democratic life. Contributors Mike Ananny, Chris W. Anderson, Rodney Benson, Pablo J. Boczkowski, danah boyd, Robyn Caplan, Michael X. Delli Carpini, Josh Cowls, Susan J. Douglas, Keith N. Hampton, Dave Karpf, Daniel Kreiss, Seth C. Lewis, Zoey Lichtenheld, Andrew L. Mendelson, Gina Neff, Zizi Papacharissi, Katy E. Pearce, Victor Pickard, Sue Robinson, Adrienne Russell, Ralph Schroeder, Michael Schudson, Julia Sonnevend, Keren Tenenboim-Weinblatt, Tina Tucker, Fred Turner, Nikki Usher, Karin Wahl-Jorgensen, Silvio Waisbord, Barbie Zelizer

The Trump Presidency, Journalism, and Democracy (Routledge Research in Journalism)

by Robert E. Gutsche Jr.

This book examines the disruptive nature of Trump news – both the news his administration makes and the coverage of it – related to dominant paradigms and ideologies of U.S. journalism. By relying on conceptualizations of media memory and "othering" through news coverage that enhances socio-conservative positions on issues such as immigration, the book positions this moment in a time of contestation. Contributors ranging from scholars, professionals, and media critics operate in unison to analyze today’s interconnected challenges to traditional practices within media spheres posed by Trump news. The outcomes should resonate with citizens who rely on journalism for civic engagement and who are active in social change

Trump Was a Joke: How Satire Made Sense of a President Who Didn’t (Routledge Advances in Theatre & Performance Studies)

by Sophia A Mcclennen

Written by a scholar of satire and politics, Trump Was a Joke explains why satire is an exceptional foil for absurd political times and why it did a particularly good job of making sense of Trump. Covering a range of comedic interventions, Trump Was a Joke analyzes why political satire is surprisingly effective at keeping us sane when politics is making us crazy. Its goal is to highlight the unique power of political satire to encourage critical thinking, foster civic action, and further rational debate in moments of political hubris and hysteria. The book has been endorsed by Bassem Youssef, who has been referred to as the “Jon Stewart of Egypt,” and Srdja Popovic, author of Blueprint for Revolution, who used satirical activism to bring down Serbian dictator Slobodan Milosevic. With a foreword by award-winning filmmaker, satirist, and activist Michael Moore, this study will be of interest to readers who follow politics and enjoy political comedy and will appeal to the communications, comedy studies, media studies, political science, rhetoric, cultural studies, and American studies markets.

Trust and Communication in a Digitized World

by Bernd Blöbaum

This book explores models and concepts of trust in a digitized world. Trust is a core concept that comes into play in multiple social and economicrelations of our modern life. The book provides insights into the current stateof research while presenting the viewpoints of a variety of disciplines such ascommunication studies, information systems, educational and organizational psychology,sports psychology and economics. Focusing on an investigation of how the Internetis changing the relationship between trust and communication, and the impact thischange has on trust research, this volume facilitates a greater understandingof these topics, thus enabling their employment in social relations.

Trust and Records in an Open Digital Environment (Routledge Guides to Practice in Libraries, Archives and Information Science)

by Hrvoje Stančić

Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stančić and the contributors address these challenges by taking three themes – state, citizens, and documentary form – and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.

Trust and Reputation Management Systems

by Denis Trček

This book provides an understanding of the core pillars of trust and reputation systems in electronic business settings. It presents the main existing methods and evaluates them from a managerial point of view. The book outlines the necessary technological environment without entangling the reader in too much technical detail. An implementation roadmap on a strategic and tactical level is given as well as guidance on linking trust and reputation management to existing information systems. Existing standards and solutions like recommendation systems, web services, semantic and big data technologies are put into context to prevent subverting efforts using false ratings, faked identities and other security issues. An outlook into recent and future developments completes the book.

Trust and Trustworthy Computing

by Mauro Conti Matthias Schunter Ioannis Askoxylakis

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Trust and Trustworthy Computing

by Michael Franz Panos Papadimitratos

This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs.

Trust-based Collective View Prediction

by Su Chen Guandong Xu Jia Zhou Tiejian Luo

Collective view prediction is to judge the opinions of an active web user based on unknown elements by referring to the collective mind of the whole community. Content-based recommendation and collaborative filtering are two mainstream collective view prediction techniques. They generate predictions by analyzing the text features of the target object or the similarity of users' past behaviors. Still, these techniques are vulnerable to the artificially-injected noise data, because they are not able to judge the reliability and credibility of the information sources. Trust-based Collective View Prediction describes new approaches for tackling this problem by utilizing users' trust relationships from the perspectives of fundamental theory, trust-based collective view prediction algorithms and real case studies. The book consists of two main parts - a theoretical foundation and an algorithmic study. The first part will review several basic concepts and methods related to collective view prediction, such as state-of-the-art recommender systems, sentimental analysis, collective view, trust management, the Relationship of Collective View and Trustworthy, and trust in collective view prediction. In the second part, the authors present their models and algorithms based on a quantitative analysis of more than 300 thousand users' data from popular product-reviewing websites. They also introduce two new trust-based prediction algorithms, one collaborative algorithm based on the second-order Markov random walk model, and one Bayesian fitting model for combining multiple predictors. The discussed concepts, developed algorithms, empirical results, evaluation methodologies and the robust analysis framework described in Trust-based Collective View Prediction will not only provide valuable insights and findings to related research communities and peers, but also showcase the great potential to encourage industries and business partners to integrate these techniques into new applications.

Trust, Computing, and Society

by Richard H.R. Harper

The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.

Trust & Fault in Multi Layered Cloud Computing Architecture

by Pradeep Kumar Gupta Punit Gupta

This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing;Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system;Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.

Trust for Intelligent Recommendation

by Touhid Bhuiyan

Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can be achieved using an inferred trust network which mimics the real world "friend of a friend" recommendations. To extend the boundaries of the neighbor, an effective trust inference technique is required. This book proposes a trust interference technique called Directed Series Parallel Graph (DSPG) that has empirically outperformed other popular trust inference algorithms, such as TidalTrust and MoleTrust. For times when reliable explicit trust data is not available, this book outlines a new method called SimTrust for developing trust networks based on a user's interest similarity. To identify the interest similarity, a user's personalized tagging information is used. However, particular emphasis is given in what resources the user chooses to tag, rather than the text of the tag applied. The commonalities of the resources being tagged by the users can be used to form the neighbors used in the automated recommender system. Through a series of case studies and empirical results, this book highlights the effectiveness of this tag-similarity based method over the traditional collaborative filtering approach, which typically uses rating data. Trust for Intelligent Recommendation is intended for practitioners as a reference guide for developing improved, trust-based recommender systems. Researchers in a related field will also find this book valuable.

Trust in Computer Systems and the Cloud

by Mike Bursell

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.

Trust in Cyberspace

by National Research Council

Whether or not you use a computer, you probably use a telephone, electric power, and a bank. Although you may not be aware of their presence, networked computer systems are increasingly becoming an integral part of your daily life. Yet, if such systems perform poorly or don't work at all, then they can put life, liberty, and property at tremendous risk. Is the trust that we--as individuals and as a society--are placing in networked computer systems justified? And if it isn't, what can we do to make such systems more trustworthy?This book provides an assessment of the current state of the art procedures for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, the book assesses current technical and market trends in order to better inform public policy as to where progress is likely and where incentives could help. Trust in Cyberspace offers insights into:--The strengths and vulnerabilities of the telephone network and Internet, the two likely building blocks of any networked information system.--The interplay between various dimensions of trustworthiness: environmental disruption, operator error, "buggy" software, and hostile attack.--The implications for trustworthiness of anticipated developments in hardware and software technology, including the consequences of mobile code.--The shifts in security technology and research resulting from replacing centralized mainframes with networks of computers.--The heightened concern for integrity and availability where once only secrecy mattered.--The way in which federal research funding levels and practices have affected the evolution and current state of the science and technology base in this area.You will want to read this book if your life is touched in any way by computers or telecommunications. But then, whose life isn't?

Trust Management in Cloud Services

by Talal H. Noor Quan Z. Sheng Athman Bouguettaya

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.

Trust Management in the Chinese E-Commerce Market: Based on the Perspective of the Adverse Selection (Advanced Studies in E-Commerce)

by Yong Pan

Based on the classic adverse selection model, this book sets up the cyber “lemons” market model and analyzes the basic rule of asymmetric information. This book focuses on the topics as following: Is there “lemons” in e-commerce market? What rule do the cyber “lemons” characterize? How to build the cyber “lemon” market model? What is the particularity of adverse selection in cyber markets? What is more, how to eliminate or avoid the cyber “lemons” in Chinse e-commerce market?This book aims to provide the accumulation for e-commerce research and support decision-making for management in Chinese e-commerce markets, and suggests trust management solutions to eliminate or decrease the cyber ‘lemons’. Through this book, it helps readers understand the ideas and effective methods of trust management in the Chinse e-commerce market, while deepening the reverse selection model and theory.

Trust Management in the Internet of Vehicles

by Adnan Mahmood Michael Sheng Wei Emma Zhang Sira Yongchareon

The Internet of Vehicles (IoV) is referred to as an efficient and inevitable convergence of the Internet of Things, intelligent transportation systems, edge / fog and cloud computing, and big data, all of which could be intelligently harvested for the cooperative vehicular safety and non-safety applications as well as cooperative mobility management. A secure and low-latency communication is, therefore, indispensable to meet the stringent performance requirements of the safety-critical vehicular applications. Whilst the challenges surrounding low latency are being addressed by the researchers in both academia and industry, it is the security of an IoV network which is of paramount importance, as a single malicious message is perfectly capable enough of jeopardizing the entire networking infrastructure and can prove fatal for the vehicular passengers and the vulnerable pedestrians. This book thus investigates the promising notion of trust in a bid to strengthen the resilience of the IoV networks. It not only introduces trust categorically in the context of an IoV network, i.e., in terms of its fundamentals and salient characteristics, but further envisages state-of-the-art trust models and intelligent trust threshold mechanisms for segregating both malicious and non-malicious vehicles. Furthermore, open research challenges and recommendations for addressing the same are discussed in the same too.

Trust Management IX

by Christian Damsgaard Jensen Stephen Marsh Theo Dimitrakos Yuko Murayama

This book constitutes the refereed proceedings of the 9th IFIP WG 11. 11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems. The papers cover a wide range of topics including trust and reputation and models thereof, the relationship between trust and security, socio-technical aspects of trust, reputation and privacy, trust in the cloud and behavioural models of trust.

Trust Management XI: 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings (IFIP Advances in Information and Communication Technology #505)

by Jan-Philipp Steghöfer and Babak Esfandiari

This book constitutes the refereed proceedings of the 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2017, held in Gothenburg, Sweden, in June 2017. The 8 revised full papers and 6 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: information sharing and personal data; novel sources of trust and trust information; applications of trust; trust metrics; and reputation systems. Also included is the 2017 William Winsborough commemorative address and three short IFIPTM 2017 graduate symposium presentations.

Trust Management XII: 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedings (IFIP Advances in Information and Communication Technology #528)

by Nurit Gal-Oz Peter R. Lewis

This book constitutes the refereed proceedings of the 12th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2018, held in Toronto, ON, Canada, in July 2018.The 7 revised full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers feature both theoretical research and real-world case studies and cover the following topical areas: trust in information technology; socio-technical, economic, and sociological trust; trust and reputation management systems; identity management and trust; secure, trustworthy and privacy-aware systems; trust building in large scale systems; and trustworthyness of adaptive systems. Also included is the 2018 William Winsborough commemorative address.

Refine Search

Showing 52,501 through 52,525 of 55,671 results