Sciweavers

5891 search results - page 1171 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
RECSYS
2009
ACM
15 years 4 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
INFOCOM
2008
IEEE
15 years 3 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
ICSOC
2007
Springer
15 years 3 months ago
Pattern Based SOA Deployment
Abstract. A key function of a Service Oriented Architecture is the separation between business logic and the platform of its implementation and deployment. Much of the focus in SOA...
William Arnold, Tamar Eilam, Michael H. Kalantar, ...
106
Voted
PPAM
2007
Springer
15 years 3 months ago
Alea - Grid Scheduling Simulation Environment
This work concentrates on the design of a system intended for study of advanced scheduling techniques for planning various types of jobs in a Grid environment. The solution is able...
Dalibor Klusácek, Ludek Matyska, Hana Rudov...
90
Voted
HRI
2006
ACM
15 years 3 months ago
Teaching robots by moulding behavior and scaffolding the environment
Programming robots to carry out useful tasks is both a complex and non-trivial exercise. A simple and intuitive method to allow humans to train and shape robot behaviour is clearl...
Joe Saunders, Chrystopher L. Nehaniv, Kerstin Daut...
« Prev « First page 1171 / 1179 Last » Next »