Sciweavers

8377 search results - page 1629 / 1676
» Scenarios - Introduction
Sort
View
IFIPTM
2010
113views Management» more  IFIPTM 2010»
14 years 10 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
14 years 10 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
IJMMS
2010
161views more  IJMMS 2010»
14 years 10 months ago
Persuasive robotic assistant for health self-management of older adults: Design and evaluation of social behaviors
Daily health self-management, such as the harmonization of food, exercise and medication, is a major problem for a large group of older adults with obesity or diabetics. Computer-...
Rosemarijn Looije, Mark A. Neerincx, Fokie Cnossen
INFOCOM
2010
IEEE
14 years 10 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
INFOCOM
2010
IEEE
14 years 10 months ago
Network Coding Tomography for Network Failures
—Network Tomography (or network monitoring) uses end-to-end path-level measurements to characterize the network, such as topology estimation and failure detection. This work prov...
Hongyi Yao, Sidharth Jaggi, Minghua Chen
« Prev « First page 1629 / 1676 Last » Next »