Sciweavers

405 search results - page 44 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICSM
2000
IEEE
15 years 2 months ago
An Approach to Limit the Wynot Problem
Software evolution in a cooperative environment, where a pool of maintainers/developers contribute to the overall system changes, is challanging due to several factors, such as th...
Giuliano Antoniol, Gerardo Casazza, Aniello Cimiti...
SIGECOM
2000
ACM
121views ECommerce» more  SIGECOM 2000»
15 years 2 months ago
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Reputation reporting systems have emerged as an important risk management mechanism in online trading communities. However, the predictive value of these systems can be compromise...
Chrysanthos Dellarocas
CCS
1994
ACM
15 years 1 months ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
CDC
2009
IEEE
155views Control Systems» more  CDC 2009»
15 years 1 months ago
Improved independent component regression modeling
The conventional independent component regression (ICR), as an exclusive two-step implementation algorithm, has the risk similar to principal component regression (PCR). That is, t...
Chunhui Zhao, Furong Gao, Tao Liu, Fuli Wang
DSOM
2007
Springer
15 years 1 months ago
Bottleneck Detection Using Statistical Intervention Analysis
Abstract. The complexity of today's large-scale enterprise applications demands system administrators to monitor enormous amounts of metrics, and reconfigure their hardware as...
Simon Malkowski, Markus Hedwig, Jason Parekh, Calt...