Sciweavers

770 search results - page 111 / 154
» Toward an Optimal Redundancy Strategy for Distributed Comput...
Sort
View
135
Voted
ICDCS
2009
IEEE
16 years 26 days ago
Minimizing the Hidden Cost of RDMA
Remote Direct Memory Access (RDMA) is a mechanism whereby data is moved directly between the application memory of the local and remote computer. In bypassing the operating system...
Philip Werner Frey, Gustavo Alonso
124
Voted
ICDCSW
2008
IEEE
15 years 10 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
125
Voted
FASE
2008
Springer
15 years 5 months ago
Engineering Service Oriented Applications: From StPowla Processes to SRML Models
Service Oriented Computing is a paradigm for developing software systems as the composition of a number of services. Services are loosely coupled entities, can be dynamically publi...
Laura Bocchi, Stephen Gorton, Stephan Reiff-Margan...
141
Voted
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
112
Voted
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
16 years 17 days ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl