Sciweavers

2099 search results - page 353 / 420
» Service Trading and Mediation in Distributed Computing Syste...
Sort
View
ICDCSW
2006
IEEE
14 years 3 months ago
Enforcing Truthful-Rating Equilibria in Electronic Marketplaces
Reputation-based mechanisms and policies are vulnerable to the submission of untruthful ratings. In this paper, we define and analyze a game-theoretic model that captures the dyn...
Thanasis G. Papaioannou, George D. Stamoulis
SAC
2006
ACM
14 years 2 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
ESCIENCE
2005
IEEE
14 years 2 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
GROUP
1999
ACM
14 years 1 months ago
Modeling collaboration using shared objects
Many object-oriented toolkits and frameworks for groupware development provide shared objects as a basic service. This relieves developers of a lot of problems originating from th...
Christian Schuckmann, Jan Schümmer, Peter Sei...
ICNP
1998
IEEE
14 years 1 months ago
QGMA: A New MAC Protocol for Supporting QoS in Wireless Local Area Networks
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
Yi Ye, Chao-Ju Hou, Ching-Chih Han