Sciweavers

1715 search results - page 188 / 343
» Trust and Reputation Systems
Sort
View
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
ISJ
2006
134views more  ISJ 2006»
14 years 10 months ago
Relative importance of evaluation criteria for enterprise systems: a conjoint study
Abstract. While a large body of research exists on the development and implementation of software, organizations are increasingly acquiring enterprise software packages [e.g. enter...
Mark Keil, Amrit Tiwana
CCS
2006
ACM
15 years 1 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
105
Voted
ICEGOV
2009
ACM
14 years 7 months ago
A web-based performance monitoring system for e-government services
An e-Government portal represents not only a reputable public image of the sovereignty of a region, it is responsible for serving many users from local citizens and beyond, in a r...
Simon Fong, Ho Si Meng
INFOSCALE
2009
ACM
15 years 4 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li