Sciweavers

233 search results - page 31 / 47
» Sequential decision making with untrustworthy service provid...
Sort
View
86
Voted
ADHOC
2007
133views more  ADHOC 2007»
14 years 9 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
74
Voted
IPPS
2007
IEEE
15 years 4 months ago
A Flexible Resource Management Architecture for the Blue Gene/P Supercomputer
Blue Gene R /P is a massively parallel supercomputer intended as the successor to Blue Gene/L. It leverages much of the existing architecture of its predecessor to provide scalabi...
Sam Miller, Mark Megerian, Paul Allen, Tom Budnik
82
Voted
WINE
2005
Springer
149views Economy» more  WINE 2005»
15 years 3 months ago
Enforcing Truthful Strategies in Incentive Compatible Reputation Mechanisms
Abstract. We commonly use the experience of others when taking decisions. Reputation mechanisms aggregate in a formal way the feedback collected from peers and compute the reputati...
Radu Jurca, Boi Faltings
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui
CSREAPSC
2006
14 years 11 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili