Sciweavers

325 search results - page 42 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
ATAL
2005
Springer
14 years 1 months ago
Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model
This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems. The following are key drivers...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
LREC
2010
147views Education» more  LREC 2010»
13 years 9 months ago
Speaker Attribution in Cabinet Protocols
Historical cabinet protocols are a useful resource which enable historians to identify the opinions expressed by politicians on different subjects and at different points of time....
Josef Ruppenhofer, Caroline Sporleder, Fabian Shir...
SIGMOD
2008
ACM
182views Database» more  SIGMOD 2008»
14 years 7 months ago
Multi-tenant databases for software as a service: schema-mapping techniques
In the implementation of hosted business services, multiple tenants are often consolidated into the same database to reduce total cost of ownership. Common practice is to map mult...
Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons...
CSJM
2007
150views more  CSJM 2007»
13 years 7 months ago
An approach for NL text interpretation
For modeling the interpretation process of NL sentences we use the mechanisms implying semantic networks that assure syntactic – semantic text interpretation (SSI), including an...
Anatol Popescu, Sergiu Cretu
ISPAN
2005
IEEE
14 years 1 months ago
An Efficient MPI-IO for Noncontiguous Data Access over InfiniBand
Noncontiguous data access is a very common access pattern in many scientific applications. Using POSIX I/O to access many pieces of noncontiguous data segments will generate a lot...
Ding-Yong Hong, Ching-Wen You, Yeh-Ching Chung