Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
Abstract. More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies ...
Yue Lu, Yong Zhao, Fernando A. Kuipers, Piet Van M...
—Today’s enterprise data centers are shifting towards a utility computing model where many business critical applications share a common pool of infrastructure resources that o...
Besides ordinary applications, also infrastructure software such as operating systems or database management systems is being developed as a software product line. With proper too...
In systems of autonomous self-interested agents, in which agents' neighbourhoods are defined by their connections to others, cooperation can arise through observation of the ...