Sciweavers

380 search results - page 41 / 76
» An Individual View on Cooperation Networks
Sort
View
SOCIALCOM
2010
14 years 7 months ago
Bonding vs. Bridging Social Capital: A Case Study in Twitter
Online communities are connecting large numbers of individuals and generating rich social network data, opening the way for empirical studies of social behavior. In this paper, we ...
Matthew S. Smith, Christophe G. Giraud-Carrier
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
15 years 2 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
ICDCSW
2006
IEEE
15 years 3 months ago
Fuzzy Trust for Peer-to-Peer Systems
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
Nathan Griffiths, Kuo-Ming Chao, Muhammad Younas
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 4 months ago
Asynchronous distributed optimization with minimal communication
— We consider problems where multiple agents must cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchange...
Minyi Zhong, Christos G. Cassandras
ICAPR
2005
Springer
15 years 3 months ago
GP Ensemble for Distributed Intrusion Detection Systems
In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multiisland model-based environment to monitor security...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...