Sciweavers

832 search results - page 67 / 167
» Effect of Malicious Synchronization
Sort
View
104
Voted
DISCEX
2003
IEEE
15 years 8 months ago
Willow System Demonstration
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modern critical applica...
John C. Knight, Jonathan Hill, Philip E. Varner, P...
130
Voted
CLUSTER
2008
IEEE
15 years 10 months ago
A trace-driven emulation framework to predict scalability of large clusters in presence of OS Jitter
—Various studies have pointed out the debilitating effects of OS Jitter on the performance of parallel applications on large clusters such as the ASCI Purple and the Mare Nostrum...
Pradipta De, Ravi Kothari, Vijay Mann
157
Voted
WS
2003
ACM
15 years 8 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
156
Voted
AIRWEB
2008
Springer
15 years 5 months ago
A few bad votes too many?: towards robust ranking in social media
Online social media draws heavily on active reader participation, such as voting or rating of news stories, articles, or responses to a question. This user feedback is invaluable ...
Jiang Bian, Yandong Liu, Eugene Agichtein, Hongyua...
141
Voted
TKDE
2010
158views more  TKDE 2010»
15 years 1 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...