Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Principal component analysis has proven to be useful for understanding geometric variability in populations of parameterized objects. The statistical framework is well understood ...
In this paper we describe how we use a group of users’ accesses and interactions with web pages to discover and recommend relevant common navigation paths to other users. We col...
Abstract— We present a distributed scheme for trust inference in peer-to-peer networks. Our work is in context of the NICE system, which is a platform for implementing cooperativ...
A number of people are exchanging e-mail messages everyday using mobile phones and PDAs. E-mail is useful not only for oneto-one communication but group communication through mail...