Sciweavers

6229 search results - page 1012 / 1246
» Models of Computation for Networks on Chip
Sort
View
ICDCSW
2006
IEEE
15 years 6 months ago
Enforcing Truthful-Rating Equilibria in Electronic Marketplaces
Reputation-based mechanisms and policies are vulnerable to the submission of untruthful ratings. In this paper, we define and analyze a game-theoretic model that captures the dyn...
Thanasis G. Papaioannou, George D. Stamoulis
111
Voted
ACCV
2006
Springer
15 years 6 months ago
Tracking Targets Via Particle Based Belief Propagation
We first formulate multiple targets tracking problem in a dynamic Markov network(DMN)which is derived from a MRFs for joint target state and a binary process for occlusion of dual...
Jianru Xue, Nanning Zheng, Xiaopin Zhong
ICDCSW
2005
IEEE
15 years 6 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
82
Voted
ICDCSW
2005
IEEE
15 years 6 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
LCN
2005
IEEE
15 years 6 months ago
Design and Evaluation of a High Performance Parallel File System
In this paper we propose a high performance parallel file system over iSCSI (iPVFS) for cluster computing. iPVFS provides a cost-effective solution for heterogeneous cluster envi...
Li Ou, Xubin (Ben) He
« Prev « First page 1012 / 1246 Last » Next »