Sciweavers

1087 search results - page 157 / 218
» Achieving Distributed Control through Model Checking
Sort
View
SAC
2008
ACM
13 years 8 months ago
Improving denial of service resistance using dynamic local adaptations
We improve the resistance of gossip-based multicast to (Distributed) Denial of Service (DoS) attacks using dynamic local adaptations at each node. Each node estimates the current ...
Gal Badishi, Idit Keidar
WINET
2010
180views more  WINET 2010»
13 years 7 months ago
An analytical model for performance evaluation of multimedia applications over EDCA in an IEEE 802.11e WLAN
—We extend the modeling heuristic of [1] to evaluate the performance of an IEEE 802.11e infrastructure network carrying packet telephone calls, streaming video sessions and TCP c...
Sri Harsha, Anurag Kumar, Vinod Sharma
CCS
2005
ACM
14 years 2 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
PKDD
2010
Springer
169views Data Mining» more  PKDD 2010»
13 years 7 months ago
Efficient and Numerically Stable Sparse Learning
We consider the problem of numerical stability and model density growth when training a sparse linear model from massive data. We focus on scalable algorithms that optimize certain...
Sihong Xie, Wei Fan, Olivier Verscheure, Jiangtao ...
APN
2010
Springer
14 years 2 months ago
Wendy: A Tool to Synthesize Partners for Services
Service-oriented computing proposes services as building blocks which can be composed to complex systems. To reason about the correctness of a service, its communication protocol n...
Niels Lohmann, Daniela Weinberg