Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CSE
2008
IEEE
10 years 11 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
CSE
2008
IEEE
10 years 11 months ago
Adaptation to Dynamic Resource Availability in Ad Hoc Grids through a Learning Mechanism
Ad-hoc Grids are highly heterogeneous and dynamic networks, one of the main challenges of resource allocation in such environments is to find mechanisms which do not rely on the ...
Behnaz Pourebrahimi, Koen Bertels
CSE
2008
IEEE
10 years 11 months ago
3D Computer Simulations of Pulsatile Human Blood Flows in Vessels and in the Aortic Arch: Investigation of Non-Newtonian Charact
Methods of Computational Fluid Dynamics are applied to simulate pulsatile blood flow in human vessels and in the aortic arch. The non-Newtonian behaviour of the human blood is in...
Renat A. Sultanov, Dennis Guster, Brent Engelbrekt...
CSE
2008
IEEE
10 years 11 months ago
Energy Model for H2S Monitoring Wireless Sensor Network
Abstract— Several applications have been proposed for Wireless sensor networks. These include habitat monitoring, structural health monitoring, pipeline (gas, water, and oil) mon...
Xiaojuan Chao, Waltenegus Dargie, Lin Guan
CSE
2008
IEEE
10 years 11 months ago
Parallel Modeling of Fish Interaction
This paper summarizes our work on a parallel algorithm for an interacting particle model, derived from the model by Czirok, Vicsek, et. al. [3, 4, 5, 13, 14]. Our model is particu...
Lamia Youseff, Alethea B. T. Barbaro, Peterson F. ...
CSE
2008
IEEE
10 years 11 months ago
An Experimental Peer-to-Peer E-mail System
Conventional e-mail systems are prone to problems that affect their dependability. E-mail systems operate following a “push-based” approach: the sender side server pushes the ...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
CSE
2009
IEEE
10 years 11 months ago
The Social Behaviors of Experts in Massive Multiplayer Online Role-Playing Games
— We examine the social behaviors of game experts in Everquest II, a popular massive multiplayer online role-playing game (MMO). We rely on Exponential Random Graph Models (ERGM)...
David Huffaker, Jing (Annie) Wang, Jeffrey William...
CSE
2009
IEEE
10 years 11 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
CSE
2009
IEEE
10 years 11 months ago
A Survey of Human Computation Systems
—Human computation is a technique that makes use of human abilities for computation to solve problems. The human computation problems are the problems those computers are not goo...
Man-Ching Yuen, Ling-Jyh Chen, Irwin King
books