Peer-to-peer environments have become popular as a framework for exchange of services. In these environments, certain peers may fail to provide their services. Reputation can be a...
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Abstract. Due to the high availability of the Internet, many large crossorganization collaboration projects, such as SourceForge, grid systems etc., have emerged. One of the fundam...
Meng-Ru Lin, Ssu-Hsuan Lu, Tsung-Hsuan Ho, Peter L...
Unlike numerical preferences, preferences on attribute values do not show an inherent total order, but skyline computation has to rely on partial orderings explicitly stated by th...
Nowadays, the leading e-learning platforms are converging towards standardization. This paper presents an extension to the SCORM, today's most well acclaimed e-learning stand...