Sciweavers

512 search results - page 34 / 103
» Introducing the aggregate
Sort
View
ANSS
2008
IEEE
14 years 2 months ago
Beyond the Model of Persistent TCP Flows: Open-Loop vs Closed-Loop Arrivals of Non-persistent Flows
It is common for simulation and analytical studies to model Internet traffic as an aggregation of mostly persistent TCP flows. In practice, however, flows follow a heavytailed ...
Ravi S. Prasad, Constantine Dovrolis
BPM
2007
Springer
258views Business» more  BPM 2007»
13 years 11 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
INFOCOM
2012
IEEE
11 years 10 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
ATAL
2003
Springer
14 years 24 days ago
Detecting deception in reputation management
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another...
Bin Yu, Munindar P. Singh
SIGIR
2012
ACM
11 years 10 months ago
Building reputation and trust using federated search and opinion mining
The term online reputation addresses trust relationships amongst agents in dynamic open systems. These can appear as ratings, recommendations, referrals and feedback. Several repu...
Somayeh Khatiban