Sciweavers

1479 search results - page 242 / 296
» Management without (Detailed) Models
Sort
View
MABS
2007
Springer
14 years 4 months ago
Beyond Accuracy. Reputation for Partner Selection with Lies and Retaliation
In an unpredictable, heterogeneous world, intelligent agents depend on accurate social information; reputation, among the preeminent artifacts to transmit social evaluations, has b...
Isaac Pinyol, Mario Paolucci, Jordi Sabater-Mir, R...
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 4 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
CCGRID
2006
IEEE
14 years 4 months ago
Exploit Failure Prediction for Adaptive Fault-Tolerance in Cluster Computing
As the scale of cluster computing grows, it is becoming hard for long-running applications to complete without facing failures on large-scale clusters. To address this issue, chec...
Yawei Li, Zhiling Lan
DSN
2006
IEEE
14 years 4 months ago
Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults
The Solaris 10 Operating System includes a number of new features for predictive self-healing. One such feature is the ability of the Fault Management software to diagnose memory ...
Dong Tang, Peter Carruthers, Zuheir Totari, Michae...
IEEESCC
2006
IEEE
14 years 4 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan