Sciweavers

733 search results - page 115 / 147
» Measurements, Analysis, and Modeling of BitTorrent-like Syst...
Sort
View
ISW
2009
Springer
15 years 6 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
ICAIL
2009
ACM
15 years 6 months ago
Query-based opinion summarization for legal blog entries
We present the first report of automatic sentiment summarization in the legal domain. This work is based on processing a set of legal questions with a system consisting of a semi...
Jack G. Conrad, Jochen L. Leidner, Frank Schilder,...
AINA
2009
IEEE
15 years 6 months ago
Combined On-line and Off-line Trust Mechanism for Agent Computing
In this paper, we propose an efficient mechanism dealing with trust assessment for agent societies, aiming to accurately assess the trustworthiness of the collaborating agents. I...
Babak Khosravifar, Jamal Bentahar, Maziar Gomrokch...
ISQED
2009
IEEE
70views Hardware» more  ISQED 2009»
15 years 6 months ago
On-chip transistor characterization arrays with digital interfaces for variability characterization
An on-chip test-and-measurement system with digital interfaces that can perform device-level characterization of large-dense arrays of transistors is demonstrated in 90- and 65-nm...
Simeon Realov, William McLaughlin, Kenneth L. Shep...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 6 days ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik