Sciweavers

10950 search results - page 2028 / 2190
» Future wireless networks
Sort
View
111
Voted
ACSAC
2008
IEEE
15 years 7 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ICDCSW
2008
IEEE
15 years 7 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
110
Voted
ICDCSW
2008
IEEE
15 years 7 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
90
Voted
ICPADS
2008
IEEE
15 years 7 months ago
snapPVFS: Snapshot-Able Parallel Virtual File System
In this paper, we propose a modified parallel virtual file system that provides snapshot functionality. Because typical file systems are exposed to various failures, taking a s...
Kwangho Cha, Jin-Soo Kim, Seungryoul Maeng
109
Voted
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 7 months ago
Non-traditional irregular interconnects for massive scale SoC
— By using self-assembling fabrication techniques at the cellular, molecular, or atomic scale, it is nowadays possible to create functional assemblies in a mainly bottom-up way t...
Christof Teuscher, Anders A. Hansson
« Prev « First page 2028 / 2190 Last » Next »