Sciweavers

7683 search results - page 1467 / 1537
» Distributed Computing with the CLAN Network
Sort
View
IDTRUST
2009
ACM
15 years 10 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
P2P
2009
IEEE
126views Communications» more  P2P 2009»
15 years 10 months ago
Robust Lifetime Measurement in Large-Scale P2P Systems with Non-Stationary Arrivals
—Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work [26] has shown that direct sampling...
Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri...
ATAL
2009
Springer
15 years 10 months ago
Hedonic coalition nets
In hedonic games, players have the opportunity to form coalitions, and have preferences over the coalitions they might join. Such games can be used to model a variety of settings ...
Edith Elkind, Michael Wooldridge
126
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
CEC
2008
IEEE
15 years 10 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
« Prev « First page 1467 / 1537 Last » Next »