Sciweavers

5234 search results - page 969 / 1047
» Simulation of Computer Network Attacks
Sort
View
HPDC
2007
IEEE
15 years 9 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov
ICDCS
2007
IEEE
15 years 9 months ago
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol
BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical mod...
Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bh...
ICDCS
2007
IEEE
15 years 9 months ago
Distributed Resource Management and Admission Control of Stream Processing Systems with Max Utility
A fundamental problem in a large scale decentralized stream processing system is how to best utilize the available resources and admission control the bursty and high volume input...
Cathy H. Xia, Donald F. Towsley, Chun Zhang
ICDCSW
2007
IEEE
15 years 9 months ago
Building Trust in Online Rating Systems Through Signal Modeling
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but difficult problem. Thi...
Yafei Yang, Yan Lindsay Sun, Jin Ren, Qing Yang
126
Voted
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 9 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah