Sciweavers

1146 search results - page 84 / 230
» Evaluation of modeling techniques for agent-based systems
Sort
View
PET
2005
Springer
15 years 3 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
SC
2000
ACM
15 years 2 months ago
Improving Fine-Grained Irregular Shared-Memory Benchmarks by Data Reordering
We demonstrate that data reordering can substantially improve the performance of fine-grained irregular sharedmemory benchmarks, on both hardware and software shared-memory syste...
Y. Charlie Hu, Alan L. Cox, Willy Zwaenepoel
WMCSA
2008
IEEE
15 years 4 months ago
Urban sensing systems: opportunistic or participatory?
The development of sensing systems for urban deployments is still in its infancy. An interesting unresolved issue is the precise role assumed by people within such systems. This i...
Nicholas D. Lane, Shane B. Eisenman, Mirco Musoles...
IJCAI
2003
14 years 11 months ago
Case-Based Recommender Systems: A Unifying View
Abstract. This paper presents a unifying framework to model casebased reasoning recommender systems (CBR-RSs). CBR-RSs have complex architectures and specialize the CBR problem sol...
Fabiana Lorenzi, Francesco Ricci
ICDE
2010
IEEE
145views Database» more  ICDE 2010»
15 years 2 months ago
MASS: a multi-facet domain-specific influential blogger mining system
With rapid development of web 2.0 technology and e-business, bloggers play significant roles in the blogosphere as well as the external world. In particular, influential bloggers c...
Yichuan Cai, Yi Chen