Sciweavers

3451 search results - page 151 / 691
» Collaborative attack modeling
Sort
View
112
Voted
WDAG
2007
Springer
73views Algorithms» more  WDAG 2007»
15 years 8 months ago
On Self-stabilizing Synchronous Actions Despite Byzantine Attacks
Consider a distributed network of n nodes that is connected to a global source of “beats”. All nodes receive the “beats” simultaneously, and operate in lock-step. A scheme ...
Danny Dolev, Ezra N. Hoch
160
Voted
CSFW
2002
IEEE
15 years 7 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
SIGIR
2009
ACM
15 years 9 months ago
Fast nonparametric matrix factorization for large-scale collaborative filtering
With the sheer growth of online user data, it becomes challenging to develop preference learning algorithms that are sufficiently flexible in modeling but also affordable in com...
Kai Yu, Shenghuo Zhu, John D. Lafferty, Yihong Gon...
112
Voted
WSC
2007
15 years 5 months ago
Agent-based simulation for collaborative cranes
Most of the materials and components for a construction project are lifted by cranes. Much research has been done for path planning, motion control, and online navigation to reduc...
Cheng Zhang, Amin Hammad
JCP
2008
156views more  JCP 2008»
15 years 2 months ago
Hybrid Approach to Collaborative Context-Aware Service Platform for Pervasive Computing
Dejene Ejigu, Marian Scuturici, Lionel Brunie