Sciweavers

980 search results - page 91 / 196
» On Negative Bases
Sort
View
ICDCSW
2005
IEEE
14 years 2 months ago
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
— In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by j...
Yu Chen, Yu-Kwong Kwok, Kai Hwang
ACII
2005
Springer
14 years 2 months ago
Investigation of Emotive Expressions of Spoken Sentences
When we meet an emotion keyword in a sentence that expresses a kind of emotion, or a word that does not directly express emotion but carries an attitude clue, it could be the case ...
Wenjie Cao, Chengqing Zong, Bo Xu
ISPA
2005
Springer
14 years 2 months ago
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed ...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
RULEML
2005
Springer
14 years 2 months ago
A Realistic Architecture for the Semantic Web
In this paper we argue that a realistic architecture for the Semantic Web must be based on multiple independent, but interoperable, stacks of languages. In particular, we argue tha...
Michael Kifer, Jos de Bruijn, Harold Boley, Dieter...
ATAL
2004
Springer
14 years 2 months ago
Temptation and Contribution in C2C Transactions: Implications for Designing Reputation Management Systems
: A reputation management system can promote trust in transactions in an online consumer-to-consumer (C2C) market. We model a C2C market by employing an agent-based approach. To di...
Hitoshi Yamamoto, Kazunari Ishida, Toshizumi Ohta