Sciweavers

4208 search results - page 459 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
15 years 10 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
ISORC
2009
IEEE
15 years 10 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega
APSCC
2008
IEEE
15 years 10 months ago
A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues
Cloud computing is an emerging computing paradigm. It aims to share data, calculations, and services transparently among users of a massive grid. Although the industry has started...
Lijun Mei, Wing Kwong Chan, Tsun-Him Tse
INFOCOM
2008
IEEE
15 years 10 months ago
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks
This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for UWSN fac...
Affan A. Syed, Wei Ye, John S. Heidemann
QEST
2008
IEEE
15 years 10 months ago
KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes
We present the KPC-Toolbox, a collection of Matlab scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way. We first present detailed sen...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni