Sciweavers

2503 search results - page 112 / 501
» Building Computer Network Attacks
Sort
View
ICDCSW
2008
IEEE
15 years 4 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
DBISP2P
2003
Springer
136views Database» more  DBISP2P 2003»
15 years 3 months ago
Building Content-Based Publish/Subscribe Systems with Distributed Hash Tables
Abstract. Building distributed content–based publish/subscribe systems has remained a challenge. Existing solutions typically use a relatively small set of trusted computers as b...
David K. Tam, Reza Azimi, Hans-Arno Jacobsen
ICAISC
2010
Springer
14 years 12 months ago
Computer Assisted Peptide Design and Optimization with Topology Preserving Neural Networks
Abstract. We propose a non-standard neural network called TPNN which offers the direct mapping from a peptide sequence to a property of interest in order to model the quantitative ...
Jörg D. Wichard, Sebastian Bandholtz, Carsten...
ISORC
2005
IEEE
15 years 3 months ago
Building Responsive TMR-Based Servers in Presence of Timing Constraints
This paper is on the construction of a fault-tolerant and responsive server subsystem in an application context where the subsystem is accessed through an asynchronous network by ...
Paul D. Ezhilchelvan, Jean-Michel Hélary, M...
CIKM
2011
Springer
13 years 10 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier