Sciweavers

54 search results - page 9 / 11
» A Holistic Approach for Managing Spyware
Sort
View
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
14 years 20 days ago
A Framework for Self-Optimizing Grids Using P2P Components
We present the framework of a new grid architecture based on the peer-to-peer and the component paradigms. In our architecture, several peer-to-peer components are loosely coupled...
Florian Schintke, Thorsten Schütt, Alexander ...
ICEGOV
2007
ACM
13 years 11 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
DIM
2009
ACM
14 years 1 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
ER
2005
Springer
134views Database» more  ER 2005»
14 years 27 days ago
An Agent-Oriented Meta-model for Enterprise Modelling
This paper proposes an agent-oriented meta-model that provides rigorous concepts for conducting enterprise modelling. The aim is to allow analysts to produce an enterprise model th...
Ivan Jureta, Stéphane Faulkner
WAC
2005
Springer
137views Communications» more  WAC 2005»
14 years 26 days ago
Towards Self-optimizing Protocol Stack for Autonomic Communication: Initial Experience
Abstract. The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are underminin...
Xiaoyuan Gu, Xiaoming Fu, Hannes Tschofenig, Lars ...