Sciweavers

363 search results - page 17 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
80
Voted
GLOBECOM
2008
IEEE
14 years 10 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
ASPLOS
2010
ACM
15 years 4 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
101
Voted
PE
2008
Springer
167views Optimization» more  PE 2008»
14 years 9 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
SC
1995
ACM
15 years 1 months ago
Predicting Application Behavior in Large Scale Shared-memory Multiprocessors
In this paper we present an analytical-based framework for parallel program performance prediction. The main thrust of this work is to provide a means for treating realistic appli...
Karim Harzallah, Kenneth C. Sevcik
INFOCOM
1997
IEEE
15 years 1 months ago
Integrated Rate and Credit Feedback Control for ABR Service in ATM Networks
We propose a ow-control scheme that combines the merits of credit- and rate-based ow-control schemes by applying direct control over both bandwidth and bu er resources. The goal...
Xi Zhang, Kang G. Shin, Qin Zheng