Sciweavers

4897 search results - page 890 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
PACT
2009
Springer
15 years 9 months ago
Parallel Evidence Propagation on Multicore Processors
In this paper, we design and implement an efficient technique for parallel evidence propagation on state-of-the-art multicore processor systems. Evidence propagation is a major ste...
Yinglong Xia, Xiaojun Feng, Viktor K. Prasanna
132
Voted
CP
1999
Springer
15 years 9 months ago
An Interval Constraint Approach to Handle Parametric Ordinary Differential Equations for Decision Support
The behaviour of many systems is naturally modelled by a set of ordinary differential equations (ODEs) which are parametric. Since decisions are often based on relations over these...
Jorge Cruz, Pedro Barahona
LCN
1999
IEEE
15 years 9 months ago
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks
In Wireless ATM networks, user connections need to be rerouted during handoff as mobile users move among base stations. The rerouting of connections must be done quickly with mini...
Khaled Salah, Elias Drakopoulos, Tzilla Elrad
SEBD
2008
121views Database» more  SEBD 2008»
15 years 6 months ago
A Fuzzy Description Logic Approach to Bilateral Matchmaking in Electronic Marketplaces
We present a novel Fuzzy Description Logic (DL) based approach to automate matchmaking in e-marketplaces. We model traders' preferences with the aid of Fuzzy DLs and, given a ...
Azzurra Ragone, Umberto Straccia, Fernando Bobillo...
TISSEC
2008
202views more  TISSEC 2008»
15 years 4 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning