Sciweavers

422 search results - page 79 / 85
» Walking the Web of Trust
Sort
View
CN
2007
80views more  CN 2007»
14 years 11 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
PVLDB
2010
120views more  PVLDB 2010»
14 years 10 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
ECWEB
2010
Springer
162views ECommerce» more  ECWEB 2010»
14 years 9 months ago
The Open Metaverse Currency (OMC) - A Micropayment Framework for Open 3D Virtual Worlds
: Virtual worlds have become very popular recently, in particular 3D virtual worlds with a built-in virtual currency that enables providers and users to monetize their creations. V...
Frank Kappe, Michael Steurer
IADIS
2009
14 years 9 months ago
Trash article detection using categorization techniques
We explore techniques for detecting news articles containing invalid information, using the help of text categorization technology. The information that exists on the World Wide W...
Christos Bouras, Vassilis Tsogkas, Vassilis Poulop...
CORR
2011
Springer
140views Education» more  CORR 2011»
14 years 3 months ago
A Wiki for Business Rules in Open Vocabulary, Executable English
The problem of business-IT alignment is of widespread economic concern. As one way of addressing the problem, this paper describes an online system that functions as a kind of Wik...
Adrian Walker