Sciweavers

2241 search results - page 440 / 449
» Performance Modeling and Evaluation of E-Business Systems
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
WAIM
2009
Springer
14 years 2 months ago
Personalized Delivery of On-Line Search Advertisement Based on User Interests
Search engine advertising has become the main stream of online advertising system. In current search engine advertising systems, all users will get the same advertisement rank if t...
Guangyi Xiao, Zhiguo Gong
ATAL
2009
Springer
14 years 2 months ago
Reward shaping for valuing communications during multi-agent coordination
Decentralised coordination in multi-agent systems is typically achieved using communication. However, in many cases, communication is expensive to utilise because there is limited...
Simon A. Williamson, Enrico H. Gerding, Nicholas R...
DEXA
2009
Springer
166views Database» more  DEXA 2009»
14 years 2 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...
IPPS
2007
IEEE
14 years 1 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...