The popularity of multimedia multicast/broadcast applications over wireless networks makes it critical to address the error-prone, heterogeneous and dynamically changing nature of ...
General trust management model that we present is adapted for ad-hoc coalition environment, rather than for classic client-supplier relationship. The trust representation used in ...
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
We present and evaluate a method for estimating the relevance and calibrating the values of parameters of an evolutionary algorithm. The method provides an information theoretic m...
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...