Sciweavers

1022 search results - page 107 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
SAC
2004
ACM
14 years 3 months ago
Towards multisensor data fusion for DoS detection
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Christos Siaterlis, Basil S. Maglaris
SOSP
2007
ACM
14 years 7 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
WWW
2011
ACM
13 years 5 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
SEMWEB
2007
Springer
14 years 4 months ago
OLA in the OAEI 2007 Evaluation Contest
Abstract. Similarity has become a classical tool for ontology confrontation motivated by alignment, mapping or merging purposes. In the definition of an ontologybased measure one ...
Jean François Djoufak Kengue, Jér&oc...
NCA
2008
IEEE
14 years 4 months ago
Identifying Failures in Grids through Monitoring and Ranking
In this paper we present FailRank, a novel framework for integrating and ranking information sources that characterize failures in a grid system. After the failing sites have been...
Demetrios Zeinalipour-Yazti, Kyriakos Neocleous, C...