Sciweavers

6229 search results - page 1012 / 1246
» Models of Computation for Networks on Chip
Sort
View
ICDCSW
2006
IEEE
15 years 10 months ago
Enforcing Truthful-Rating Equilibria in Electronic Marketplaces
Reputation-based mechanisms and policies are vulnerable to the submission of untruthful ratings. In this paper, we define and analyze a game-theoretic model that captures the dyn...
Thanasis G. Papaioannou, George D. Stamoulis
147
Voted
ACCV
2006
Springer
15 years 10 months ago
Tracking Targets Via Particle Based Belief Propagation
We first formulate multiple targets tracking problem in a dynamic Markov network(DMN)which is derived from a MRFs for joint target state and a binary process for occlusion of dual...
Jianru Xue, Nanning Zheng, Xiaopin Zhong
ICDCSW
2005
IEEE
15 years 10 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ICDCSW
2005
IEEE
15 years 10 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
LCN
2005
IEEE
15 years 10 months ago
Design and Evaluation of a High Performance Parallel File System
In this paper we propose a high performance parallel file system over iSCSI (iPVFS) for cluster computing. iPVFS provides a cost-effective solution for heterogeneous cluster envi...
Li Ou, Xubin (Ben) He
« Prev « First page 1012 / 1246 Last » Next »