Sciweavers

1422 search results - page 224 / 285
» Design, Implementation and Performance Evaluation of IP-VPN
Sort
View
ATAL
2008
Springer
15 years 6 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
CCS
2008
ACM
15 years 6 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
HPDC
2010
IEEE
15 years 5 months ago
GatorShare: a file system framework for high-throughput data management
Voluntary Computing systems or Desktop Grids (DGs) enable sharing of commodity computing resources across the globe and have gained tremendous popularity among scientific research...
Jiangyan Xu, Renato J. O. Figueiredo
SIGCOMM
2010
ACM
15 years 4 months ago
SourceSync: a distributed wireless architecture for exploiting sender diversity
Diversity is an intrinsic property of wireless networks. Recent years have witnessed the emergence of many distributed protocols like ExOR, MORE, SOAR, SOFT, and MIXIT that exploi...
Hariharan Rahul, Haitham Hassanieh, Dina Katabi
BMCBI
2008
160views more  BMCBI 2008»
15 years 4 months ago
Dynamic sensitivity analysis of biological systems
Background: A mathematical model to understand, predict, control, or even design a real biological system is a central theme in systems biology. A dynamic biological system is alw...
Wu Hsiung Wu, Feng Sheng Wang, Maw Shang Chang