Sciweavers

269 search results - page 35 / 54
» Who Thinks Who Knows Who
Sort
View
COCOON
2007
Springer
13 years 11 months ago
Scheduling Selfish Tasks: About the Performance of Truthful Algorithms
This paper deals with problems which fall into the domain of selfish scheduling: a protocol is in charge of building a schedule for a set of tasks without directly knowing their l...
George Christodoulou, Laurent Gourvès, Fann...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 9 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
CSCWD
2008
Springer
13 years 9 months ago
CEBON: Collaborative estimation based on negotiation
: The Software Engineering community has been trying to get fast and accurate software estimations for many years. Most of the proposed methods require historical information and/o...
Fabian Poblete, José A. Pino, Sergio F. Och...
DIM
2008
ACM
13 years 9 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
ASUNAM
2010
IEEE
13 years 9 months ago
Leveraging Contextual Information to Explore Posting and Linking Behaviors of Bloggers
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...
Sofus A. Macskassy