Sciweavers

2187 search results - page 337 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
ECAI
2008
Springer
13 years 11 months ago
A probabilistic trust model for semantic peer-to-peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
ICWSM
2009
13 years 7 months ago
CourseRank: A Closed-Community Social System through the Magnifying Glass
Social sites are extremely popular among users but user interactions in most sites revolve around relatively simple tasks, such as uploading resources, tagging and poking friends....
Georgia Koutrika, Benjamin Bercovitz, Filip Kalisz...
LCN
2005
IEEE
14 years 2 months ago
Implementation and Performance Analysis of a Packet Scheduler on a Programmable Network Processor
— The problem of achieving fairness in the allocation of the bandwidth resource on a link shared by multiple flows of traffic has been extensively researched over the last deca...
Fariza Sabrina, Salil S. Kanhere, Sanjay Jha
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
14 years 3 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
POLICY
2005
Springer
14 years 2 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...