Sciweavers

405 search results - page 57 / 81
» Avatar-centric Risk Evaluation
Sort
View
IEEEARES
2007
IEEE
15 years 4 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
ISCC
2007
IEEE
127views Communications» more  ISCC 2007»
15 years 4 months ago
Head-to-Tail: Managing Network Load through Random Delay Increase
Window-based congestion control is typically based on exhausting bandwidth capacity, which occasionally leads to transient congestion. Moreover, flow synchronization may deteriora...
Stylianos Dimitriou, Vassilis Tsaoussidis
SRDS
2007
IEEE
15 years 4 months ago
Using Hidden Semi-Markov Models for Effective Online Failure Prediction
A proactive handling of faults requires that the risk of upcoming failures is continuously assessed. One of the promising approaches is online failure prediction, which means that...
Felix Salfner, Miroslaw Malek
ADHOCNOW
2007
Springer
15 years 3 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
SEMWEB
2007
Springer
15 years 3 months ago
An Ontology-based Bayesian Network Approach for Representing Uncertainty in Clinical Practice Guidelines
Clinical Practice Guidelines (CPGs) play an important role in improving the quality of care and patient outcomes. Although several machine-readable representations of practice guid...
Hai-Tao Zheng, Bo-Yeong Kang, Hong-Gee Kim