Sciweavers

194 search results - page 28 / 39
» A Protection Scheme for Collaborative Environments
Sort
View
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 3 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
HCW
2000
IEEE
15 years 2 months ago
Reliable Cluster Computing with a New Checkpointing RAID-x Architecture
In a serverless cluster of PCs or workstations, the cluster must allow remote file accesses or parallel I/O directly performed over disks distributed to all client nodes. We intro...
Kai Hwang, Hai Jin, Roy S. C. Ho, Wonwoo Ro
WD
2010
14 years 7 months ago
Enhancing FEC application in LTE cellular networks
3rd Generation Partnership Project's (3GPP) Long Term Evolution (LTE) is focused on enhancing the Universal Terrestrial Radio Access (UTRA). Evolved-Multimedia Broadcast and M...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
AHSWN
2006
206views more  AHSWN 2006»
14 years 9 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
SAC
2004
ACM
15 years 3 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen