Sciweavers

875 search results - page 59 / 175
» Representing distributed systems using the Open Provenance M...
Sort
View
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ATAL
2007
Springer
15 years 4 months ago
Unifying distributed constraint algorithms in a BDI negotiation framework
This paper presents a novel, unified distributed constraint satisfaction framework based on automated negotiation. The Distributed Constraint Satisfaction Problem (DCSP) is one t...
Bao Chau Le Dinh, Kiam Tian Seow
WSC
1997
14 years 11 months ago
Java Based Conservative Distributed Simulation
Distributed discrete event simulation techniques aim at an acceleration of the execution of a self-contained simulation model by the spatial decomposition of that model and the co...
Alois Ferscha, Michael Richter
ACL
2010
14 years 7 months ago
Distributional Similarity vs. PU Learning for Entity Set Expansion
Distributional similarity is a classic technique for entity set expansion, where the system is given a set of seed entities of a particular class, and is asked to expand the set u...
Xiaoli Li, Lei Zhang, Bing Liu, See-Kiong Ng
CCGRID
2004
IEEE
15 years 1 months ago
When can an autonomous reputation scheme discourage free-riding in a peer-to-peer system?
We investigate the circumstances under which it is possible to discourage free-riding in a peer-to-peer system for resource-sharing by prioritizing resource allocation to peers wi...
Nazareno Andrade, Miranda Mowbray, Walfredo Cirne,...