Sciweavers

832 search results - page 67 / 167
» Effect of Malicious Synchronization
Sort
View
DISCEX
2003
IEEE
14 years 3 months ago
Willow System Demonstration
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modern critical applica...
John C. Knight, Jonathan Hill, Philip E. Varner, P...
CLUSTER
2008
IEEE
14 years 4 months ago
A trace-driven emulation framework to predict scalability of large clusters in presence of OS Jitter
—Various studies have pointed out the debilitating effects of OS Jitter on the performance of parallel applications on large clusters such as the ASCI Purple and the Mare Nostrum...
Pradipta De, Ravi Kothari, Vijay Mann
WS
2003
ACM
14 years 3 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
AIRWEB
2008
Springer
13 years 12 months ago
A few bad votes too many?: towards robust ranking in social media
Online social media draws heavily on active reader participation, such as voting or rating of news stories, articles, or responses to a question. This user feedback is invaluable ...
Jiang Bian, Yandong Liu, Eugene Agichtein, Hongyua...
TKDE
2010
158views more  TKDE 2010»
13 years 8 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...