Sciweavers

28962 search results - page 206 / 5793
» Computational Mechanism Design
Sort
View
ATC
2009
Springer
15 years 7 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
ICN
2009
Springer
15 years 11 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
ICPP
1998
IEEE
15 years 8 months ago
Techniques for Delayed Binding of Monitoring Mechanisms to Application-Specific Instrumentation Points
Online interaction with computer systems and applications allows developers to monitor, experiment with, and debug long-running, resource-intensive applicationsat runtime. Traditi...
Jeffrey S. Vetter, Karsten Schwan
WWW
2008
ACM
16 years 5 months ago
Model bloggers' interests based on forgetting mechanism
Blogs have been expanded at an incredible speed in recent years. Plentiful personal information makes blogs a popular way mining user profiles. In this paper, we propose a novel b...
Yuan Cheng, Guang Qiu, Jiajun Bu, Kangmiao Liu, Ye...
SISW
2003
IEEE
15 years 9 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim