Peng

Results: 1037



#Item
211

Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

Add to Reading List

Source URL: fc12.ifca.ai

Language: English - Date: 2012-02-18 14:33:53
    212Software / Computing / Reputation management / Collaboration / Intellectual property law / Peer-to-peer computing / EigenTrust / Distributed data storage / BitTorrent / Peer-to-peer / EMule / Tit for tat

    Robust Incentives via Multi-level Tit-for-tat Qiao Lian‡ , Yu Peng§ , Mao Yang§ , Zheng Zhang† , Yafei Dai§ , and Xiaoming Li§ ‡† Microsoft Research Asia, Beijing, P. R. China §

    Add to Reading List

    Source URL: iptps06.cs.ucsb.edu

    Language: English - Date: 2006-02-15 01:41:07
    213

    Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

    Add to Reading List

    Source URL: www.csc.ncsu.edu

    Language: English - Date: 2015-07-12 13:03:46
      214Software / Social networking services / Computing / World Wide Web / Renren / Kaixin001 / Facebook / Twitter / Orkut / Internet privacy / Recommender system

      Understanding Latent Interactions in Online Social Networks Jing Jiang§† , Christo Wilson† , Xiao Wang§ , Peng Huang§ , Wenpeng Sha§ , Yafei Dai§ and Ben Y. Zhao† †

      Add to Reading List

      Source URL: www.cs.ucsb.edu

      Language: English - Date: 2010-09-13 20:04:10
      215

      Georgian Week Presentation Good afternoon everyone, thanks for having me here to share my ideas with all of you. My name is Peng Tang and I came from China. Right now I am a student at Automotive Business School of Canad

      Add to Reading List

      Source URL: internationalstudies.ca

      Language: English - Date: 2015-06-02 14:20:18
        216

        A Concrete Chinese NLP Pipeline Nanyun Peng, Francis Ferraro, Mo Yu, Nicholas Andrews, Jay DeYoung, Max Thomas, Matthew R. Gormley, Travis Wolfe, Craig Harman, Benjamin Van Durme, Mark Dredze Human Language Technology Ce

        Add to Reading List

        Source URL: aclweb.org

        Language: English - Date: 2015-05-31 02:53:10
          217

          Trust Relationship Prediction Using Online Product Review Data Nan Ma Ee-Peng Lim

          Add to Reading List

          Source URL: www.dcs.bbk.ac.uk

          Language: English - Date: 2009-10-15 09:35:10
            218Internet Standards / Internet protocols / Routing protocols / Routing / Telecommunications engineering / Border Gateway Protocol / Peering / Internet service provider / Router / Multihoming / Network address translation / Computer network

            Scalable Programmable Inbound Traffic Engineering Peng Sun Laurent Vanbever Jennifer Rexford

            Add to Reading List

            Source URL: vanbever.eu

            Language: English - Date: 2015-05-23 04:42:57
            219

            Distributed reproducible research using cached computations Roger D. Peng Sandrah P. Eckel

            Add to Reading List

            Source URL: www.biostat.jhsph.edu

            Language: English - Date: 2010-11-18 09:55:15
              220

              Combining Events And Threads For Scalable Network Services Implementation And Evaluation Of Monadic, Application-level Concurrency Primitives Peng Li Steve Zdancewic

              Add to Reading List

              Source URL: fdmanana.files.wordpress.com

              Language: English - Date: 2010-06-08 16:04:04
                UPDATE