P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen...
详细信息
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
详细信息
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ...
详细信息
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future research to protect P2P networks. This paper presents a new incentive architecture- "Pyramid", whose idea first came out as a sales mode named "Pyramid Selling". By introducing this concept into P2P research, we believe the "magic" of encouraging sales in reality could also benefit the P2P world on encouraging cooperation. In particular, the paper describes in details the three layers of Pyramid’s hierarchical structure: fundamental infrastructure managing the peer organization and basic utilities, trade-based credit system supporting trust management and service charge and pyramid incentive mechanism encouraging cooperation of rational users. Model evaluation and discussion of the proposed pyramid incentive mechanism demonstrate its effectiveness in encouraging cooperation and discouraging non-cooperation respectively.
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
详细信息
Intelligent tutoring systems have being extensively researched, and are viewed as cost-effective alternatives to traditional education. However, it has been long recognized that development of such systems is labor-in...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
This paper proposed a practical approach to personalized tutoring planning by exploiting existing tutoring resources (e.g., a book, a courseware). More exactly, it does not build an instructional course from scratch -...
详细信息
暂无评论