Sciweavers

2022 search results - page 261 / 405
» Trust in Multi-Agent Systems
Sort
View
104
Voted
IPTPS
2004
Springer
15 years 6 months ago
2 P2P or Not 2 P2P?
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge how suitable a P2P solution might be for a particular problem. It is bas...
Mema Roussopoulos, Mary Baker, David S. H. Rosenth...
119
Voted
COOPIS
2002
IEEE
15 years 5 months ago
Supporting Peer-to-Peer User Communities
The paper describes a design of a peer-to-peer system which is being developed currently to support file and service (help, advise) sharing in research groups and groups of learner...
Julita Vassileva
SWWS
2008
15 years 2 months ago
A proposal for Ontology Security Standards
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semant...
Muhammad Reza Fatemi, Atilla Elçi, Zeki Bay...
100
Voted
SOSP
2007
ACM
15 years 9 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
121
Voted
CODASPY
2012
13 years 8 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...