Sciweavers

2162 search results - page 397 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
DCOSS
2007
Springer
14 years 4 months ago
Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
ESORICS
2007
Springer
14 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
GFKL
2007
Springer
196views Data Mining» more  GFKL 2007»
14 years 4 months ago
Comparison of Recommender System Algorithms Focusing on the New-item and User-bias Problem
Recommender systems are used by an increasing number of e-commerce websites to help the customers to find suitable products from a large database. One of the most popular techniqu...
Stefan Hauger, Karen H. L. Tso, Lars Schmidt-Thiem...
GPC
2007
Springer
14 years 4 months ago
Fault Management in P2P-MPI
We present in this paper the recent developments done in P2P-MPI, a grid middleware, concerning the fault management, which covers fault-tolerance for applications and fault detect...
Stéphane Genaud, Choopan Rattanapoka
ICSOC
2007
Springer
14 years 4 months ago
Architectural Decisions and Patterns for Transactional Workflows in SOA
Abstract. An important architectural style for constructing enterprise applications is to use transactional workflows in SOA. In this setting, workflow activities invoke distribute...
Olaf Zimmermann, Jonas Grundler, Stefan Tai, Frank...