Sciweavers

363 search results - page 50 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
PE
2006
Springer
130views Optimization» more  PE 2006»
13 years 7 months ago
Analysis of resource transfers in peer-to-peer file sharing applications using fluid models
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
Rossano Gaeta, Marco Gribaudo, Daniele Manini, Mat...
CGA
1999
13 years 7 months ago
Dynamics Modeling and Culling
emsintovirtualenvironments,whileabstracting the modeling process as much as possible. To achieve efficiency,weconcentrateoncullingdynamicalsystems: if the system is not in view, we...
Stephen Chenney, Jeffrey Ichnowski, David A. Forsy...
MSWIM
2009
ACM
14 years 2 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
WWW
2008
ACM
14 years 8 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
ENGL
2006
135views more  ENGL 2006»
13 years 7 months ago
An Integral Plus States Adaptive Neural Control of Aerobic Continuous Stirred Tank Reactor
A direct adaptive neural network control system with and without integral action term is designed for the general class of continuous biological fermentation processes. The control...
Ieroham S. Baruch, Petia Georgieva, Josefina Barre...