Sciweavers

1030 search results - page 201 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
HUC
2010
Springer
13 years 9 months ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 8 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
PKDD
2005
Springer
136views Data Mining» more  PKDD 2005»
14 years 2 months ago
Weka4WS: A WSRF-Enabled Weka Toolkit for Distributed Data Mining on Grids
This paper presents Weka4WS, a framework that extends the Weka toolkit for supporting distributed data mining on Grid environments. Weka4WS adopts the emerging Web Services Resourc...
Domenico Talia, Paolo Trunfio, Oreste Verta
CORR
2010
Springer
113views Education» more  CORR 2010»
13 years 7 months ago
A Strategy to enable Prefix of Multicast VoD through dynamic buffer allocation
In this paper we have proposed a dynamic buffer allocation algorithm for the prefix, based on the popularity of the videos. More cache blocks are allocated for most popular videos...
T. R. Gopalakrishnan Nair, P. Jayarekha