Sciweavers

470 search results - page 68 / 94
» An adaptive probabilistic trust model and its evaluation
Sort
View
USENIX
2003
13 years 10 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
14 years 2 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
AAAI
2006
13 years 10 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
NETWORKING
2007
13 years 10 months ago
Streaming Performance in Multiple-Tree-Based Overlays
Abstract. In this paper we evaluate the data transmission performance of a generalized multiple-tree-based overlay architecture for peer-to-peer live streaming that employs multipa...
György Dán, Viktória Fodor, Ili...
COLING
2010
13 years 3 months ago
A Study on Position Information in Document Summarization
Position information has been proved to be very effective in document summarization, especially in generic summarization. Existing approaches mostly consider the information of se...
Ouyang You, Wenjie Li, Qin Lu, Renxian Zhang