Sciweavers

4037 search results - page 608 / 808
» Routing without ordering
Sort
View
IJNSEC
2007
157views more  IJNSEC 2007»
15 years 4 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
TCS
2008
15 years 4 months ago
Extending FeatherTrait Java with Interfaces
In the context of Featherweight Java by Igarashi, Pierce, and Wadler, and its recent extension FeatherTrait Java (FTJ) by the authors, we investigate classes that can be extended ...
Luigi Liquori, Arnaud Spiwack
TFS
2008
88views more  TFS 2008»
15 years 4 months ago
A Fuzzy Linguistic Methodology to Deal With Unbalanced Linguistic Term Sets
Many real problems dealing with qualitative aspects use linguistic approaches to assess such aspects. In most of these problems, a uniform and symmetrical distribution of the lingu...
Francisco Herrera, Enrique Herrera-Viedma, Luis Ma...
TIFS
2008
109views more  TIFS 2008»
15 years 4 months ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...
JCP
2007
102views more  JCP 2007»
15 years 4 months ago
Deterministic Models of an Active Magnetic Bearing System
— In this paper the development of mathematical model of voltage-input and current-input active magnetic bearing (AMB) system in deterministic form is presented. The AMB system, ...
Abdul Rashid Husain, Mohamad Noh Ahmad, Abdul Hali...