×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [malicious peers]
Home >
malicious peers
A Literature Review on Trust Management in Web Services Access Control
755 views
Orchestra Managing Data Transfers in Computer Clusters Mosharaf Chowdhury, Matei Zaharia, Justin Ma, Michael I. Jordan, Ion Stoica UC Berkeley.
220 views
TRUST MODEL FOR AD HOC NETWORKS
33 views
SP 5: Biologically Inspired Techniques for “Organic IT” Final Year Report Participants UniBO, UPF, Telenor, RAL Lead partner: Bologna (UniBO)
218 views
6. Trust Negotiations and Trading Privacy for Trust * Presented by: Prof. Bharat Bhargava Department of Computer Sciences and Center for Education and.
212 views
Private and Trusted Interactions * Bharat Bhargava, Leszek Lilien, and Dongyan Xu {bb, llilien, dxu}@cs.purdue.edu)dxu}@cs.purdue.edu Department of Computer.
213 views
1 Peer-to-Peer Media Streaming Mohamed M. Hefeeda Advisor: Prof. Bharat Bhargava March 12, 2003.
216 views
Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.1 Outline Introduction Background Distributed DBMS Architecture Distributed Database Design.
233 views
UCDavis, ecs251 Fall 2007 11/29/2007Trust and Reputation System1 S. Felix Wu University of California, Davis
[email protected]
wu
215 views
1 The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar, Mario T.Schlosser, Hector Garcia-Molina Stanford University Appeared.
221 views
What If Some Peers Are More Equal than Others?
30 views
6. Trust Negotiations and Trading Privacy for Trust *
23 views
Next >