Sciweavers

283 search results - page 27 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
CCS
2010
ACM
13 years 6 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
IPPS
2005
IEEE
14 years 1 months ago
Virtual Gateways in the DECOS Integrated Architecture
— The DECOS architecture aims at combining the advantages of federated and integrated systems. The DECOS architecture divides the overall system into a set of nearly-independent ...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
AOSE
2005
Springer
14 years 1 months ago
Operational Modelling of Agent Autonomy: Theoretical Aspects and a Formal Language
Autonomy has always been conceived as one of the defining attributes of intelligent agents. While the past years have seen considerable progress regarding theoretical aspects of a...
Gerhard Weiß, Felix A. Fischer, Matthias Nic...
CODES
2005
IEEE
14 years 1 months ago
Improving superword level parallelism support in modern compilers
Multimedia vector instruction sets are becoming ubiquitous in most of the embedded systems used for multimedia, networking and communications. However, current compiler technology...
Christian Tenllado, Luis Piñuel, Manuel Pri...
AIED
2005
Springer
14 years 1 months ago
Semantic Description of Collaboration Scripts for Service Oriented CSCL Systems
Abstract. Many CSCL systems have embraced scripting and service oriented computing to achieve effective collaboration and system flexibility, respectively. While learning standard...
Guillermo Vega-Gorgojo, Miguel L. Bote-Lorenzo, Ed...