Sciweavers

2838 search results - page 248 / 568
» Verifying Controlled Components
Sort
View
ITRUST
2004
Springer
15 years 6 months ago
Analyzing Correlation between Trust and User Similarity in Online Communities
Abstract. Past evidence has shown that generic approaches to recommender systems based upon collaborative filtering tend to poorly scale. Moreover, their fitness for scenarios su...
Cai-Nicolas Ziegler, Georg Lausen
SAINT
2003
IEEE
15 years 6 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
94
Voted
DOCENG
2003
ACM
15 years 6 months ago
Management of trusted citations
We discuss how references and citations within a document to particular sources can be verified and guaranteed. When a document refers through a quotation to another document, th...
Christer Fernström
106
Voted
FORMATS
2003
Springer
15 years 6 months ago
Analysis of Real Time Operating System Based Applications
This text is dedicated to modelling of real-time applications running under multitasking operating system. Theoretical background is based on timed automata by Alur and Dill. As th...
Libor Waszniowski, Zdenek Hanzálek
104
Voted
AIMS
2010
Springer
15 years 5 months ago
Scalable Service Performance Monitoring
Abstract. Dependable performance measurement is a common requirement for all on-line services. The ongoing tendency to outsource not only infrastructure, but also software parts to...
Idilio Drago, Aiko Pras