Sciweavers

363 search results - page 17 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
GLOBECOM
2008
IEEE
13 years 8 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
ASPLOS
2010
ACM
14 years 2 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
PE
2008
Springer
167views Optimization» more  PE 2008»
13 years 7 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
SC
1995
ACM
13 years 11 months ago
Predicting Application Behavior in Large Scale Shared-memory Multiprocessors
In this paper we present an analytical-based framework for parallel program performance prediction. The main thrust of this work is to provide a means for treating realistic appli...
Karim Harzallah, Kenneth C. Sevcik
INFOCOM
1997
IEEE
13 years 11 months ago
Integrated Rate and Credit Feedback Control for ABR Service in ATM Networks
We propose a ow-control scheme that combines the merits of credit- and rate-based ow-control schemes by applying direct control over both bandwidth and bu er resources. The goal...
Xi Zhang, Kang G. Shin, Qin Zheng