Sciweavers

14098 search results - page 2620 / 2820
» Crowd computer interaction
Sort
View
ICST
2010
IEEE
15 years 3 months ago
Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines
Abstract—Software Product Lines (SPL) are difficult to validate due to combinatorics induced by variability across their features. This leads to combinatorial explosion of the n...
Gilles Perrouin, Sagar Sen, Jacques Klein, Benoit ...
139
Voted
IEEEHPCS
2010
15 years 3 months ago
Extending the educational scope of a particle-based simulation framework through parallelization
Particle systems have been incorporated into a wide variety of applications in both academia and industry. They can be employed to investigate complex natural phenomena, illustrat...
T. Francis Chen, Gladimir V. G. Baranoski
IEEESP
2010
99views more  IEEESP 2010»
15 years 3 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
161
Voted
IJAMC
2010
149views more  IJAMC 2010»
15 years 3 months ago
Deadline-Driven Auctions for NPC host allocation in P2P MMOGs
: This paper presents the design, implementation and evaluation of Deadline-Driven Auctions (DDA), a novel task mapping infrastructure for heterogeneous distributed environments. D...
Lu Fan, Philip W. Trinder, Hamish Taylor
136
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
« Prev « First page 2620 / 2820 Last » Next »