Sciweavers

334 search results - page 41 / 67
» Survey of trust models in different network domains
Sort
View
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 5 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
JNW
2008
167views more  JNW 2008»
13 years 7 months ago
Analyzing the ENRON Communication Network Using Agent-Based Simulation
Agent-based modeling, simulation, and network analysis approaches are one of the emergent techniques among soft computing literature. This paper presents an agent-based model for a...
Shinako Matsuyama, Takao Terano
WOSP
1998
ACM
13 years 12 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...
SOUPS
2010
ACM
13 years 7 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
PERCOM
2006
ACM
13 years 7 months ago
Incorporating Wireless Technology into Virtual Organizations Supporting the Work of Healthcare Teams
This study investigates how a virtual organization can be built in a distributed computing environment which includes wireless technology to support the work of a multi-disciplina...
Mohyuddin, W. A. Gray, David Morrey, Wendy Jones