Sciweavers

363 search results - page 65 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks
— In distributed wireless access networks, the short-term unfairness of IEEE 802.11 Distributed Coordination Function (DCF) has been revealed by many works. In this paper, a modi...
Xiaohui Ye, Xin Liu, S. J. Ben Yoo, Zhi Ding
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 1 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
RAID
2009
Springer
14 years 2 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
14 years 8 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami