Sciweavers

14558 search results - page 213 / 2912
» Resources
Sort
View
147
Voted
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 9 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
124
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A fair resource allocation algorithm for peer-to-peer overlays
— Over the past few years, Peer-to-Peer (P2P) systems have become very popular for constructing overlay networks of many nodes (peers) that allow users geographically distributed...
Yannis Drougas, Vana Kalogeraki
IPCCC
2005
IEEE
15 years 9 months ago
Real time agreement protocol and resource pre-reservation for wireless system
The third generation of mobile networks aims to offer services diversified to users, while guaranteeing acceptable QoS. This results in the setting up of strategies of increasingl...
Sonia Ben Rejeb, Sami Tabbane, Zièd Choukai...
SC
2005
ACM
15 years 9 months ago
Separating Abstractions from Resources in a Tactical Storage System
ng Abstractions from Resources in a Tactical Storage System Douglas Thain† , Sander Klous∗ , Justin Wozniak† , Paul Brenner† , Aaron Striegel† , Jesus Izaguirre† † - ...
Douglas Thain, Sander Klous, Justin M. Wozniak, Pa...
ATAL
2005
Springer
15 years 9 months ago
Emotion based adaptive reasoning for resource bounded agents
In the design of resource bounded agents, high-level cognitive activities, such as reasoning, raise important problems related both to the adaptive ability and to the computationa...
Luís Morgado, Graça Gaspar