Sciweavers

1266 search results - page 87 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
WWW
2009
ACM
16 years 5 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
MOBIHOC
2010
ACM
15 years 2 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
ICS
2000
Tsinghua U.
15 years 8 months ago
A simulation-based study of scheduling mechanisms for a dynamic cluster environment
Scheduling of processes onto processors of a parallel machine has always been an important and challenging area of research. The issue becomes even more crucial and di cult as we ...
Yanyong Zhang, Anand Sivasubramaniam, José ...
ICPR
2000
IEEE
16 years 5 months ago
A Parallel Algorithm for Tracking of Segments in Noisy Edge Images
We present a parallel implementation of a probabilistic algorithm for real time tracking of segments in noisy edge images. Given an initial solution ?a set of segments that reason...
Pedro E. López-de-Teruel, Alberto Ruiz, Jos...
ICAS
2006
IEEE
139views Robotics» more  ICAS 2006»
15 years 10 months ago
Predicting Resource Demand in Dynamic Utility Computing Environments
— We target the problem of predicting resource usage in situations where the modeling data is scarce, non-stationary, or expensive to obtain. This scenario occurs frequently in c...
Artur Andrzejak, Sven Graupner, Stefan Plantikow