Sciweavers

413 search results - page 47 / 83
» Dirichlet Reputation Systems
Sort
View
GECCO
2007
Springer
142views Optimization» more  GECCO 2007»
14 years 1 months ago
Simulations of egoistic and altruistic behaviors using the vidya multiagent system platform
This paper investigates the impacts of individual egoistic and altruistic behaviors in a virtual society built upon the Vidya game, used here as the social simulation and Multiage...
Marcelo Souza Pita, Fernando Buarque de Lima Neto
ECSA
2008
Springer
13 years 9 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CSCW
2012
ACM
12 years 3 months ago
Community-based web security: complementary roles of the serious and casual contributors
Does crowdsourcing work for web security? While the herculean task of evaluating hundreds of millions of websites can certainly benefit from the wisdom of crowds, skeptics questi...
Pern Hui Chia, John Chuang
IMAMCI
2010
60views more  IMAMCI 2010»
13 years 6 months ago
Null boundary controllability of a circular elastic arch
We consider a circular arch of thickness ε and curvature r−1 whose elastic deformations are described by a 2×2 system of linear partial differential equation. The system - of...
Arnaud Münch