Sciweavers

2022 search results - page 363 / 405
» Trust in Multi-Agent Systems
Sort
View
ICPADS
2007
IEEE
15 years 4 months ago
Finding candidate spots for replica servers based on demand fluctuation
Many service providers distribute various kinds of content over the Internet. They often use replica servers to provide stable service. To position them appropriately, service pro...
Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenj...
CEEMAS
2007
Springer
15 years 4 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CHES
2007
Springer
111views Cryptology» more  CHES 2007»
15 years 4 months ago
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay r...
Reouven Elbaz, David Champagne, Ruby B. Lee, Lione...
ECUMN
2007
Springer
15 years 4 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
EUROPAR
2007
Springer
15 years 4 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...