Sciweavers

906 search results - page 70 / 182
» Chain Dominated Orders
Sort
View
PERCOM
2008
ACM
15 years 11 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
ICC
2007
IEEE
15 years 6 months ago
QoS-aware Wavelength Assignment with BER and Latency Guarantees for Crosstalk Limited Networks
— Crosstalk originating from optical switching devices and demultiplexers can be the dominant physical impairment in large all-optical networks. When a centralized network contro...
Jun He, Maïté Brandt-Pearce, Charles L...
TRUSTBUS
2005
Springer
15 years 5 months ago
Privacy Enhanced Technologies: Methods - Markets - Misuse
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
Hannes Federrath
FGCS
2002
133views more  FGCS 2002»
14 years 11 months ago
Computational and data Grids in large-scale science and engineering
As the practice of science moves beyond the single investigator due to the complexity of the problems that now dominate science, large collaborative and multi-institutional teams ...
William E. Johnston
ISCI
2011
14 years 6 months ago
Sequential covering rule induction algorithm for variable consistency rough set approaches
We present a general rule induction algorithm based on sequential covering, suitable for variable consistency rough set approaches. This algorithm, called VC-DomLEM, can be used f...
Jerzy Blaszczynski, Roman Slowinski, Marcin Szelag