Sciweavers

1610 search results - page 269 / 322
» A Transaction Model for Mobile Computing
Sort
View
RAID
2004
Springer
14 years 2 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
WWW
2009
ACM
14 years 9 months ago
Seller's credibility in electronic markets: a complex network based approach
In the last decade, there has been an explosion of online commercial activity enabled by the World Wide Web. An electronic marketplace (e-market) provides an online method to perf...
Adriano M. Pereira, Arlei Silva, Wagner Meira Jr.,...
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
14 years 6 months ago
Discovery of Geospatial Discriminating Patterns from Remote Sensing Datasets.
Large amounts of remotely sensed data calls for data mining techniques to fully utilize their rich information content. In this paper, we study new means of discovery and summariz...
Wei Ding 0003, Tomasz F. Stepinski, Josue Salazar
SOUPS
2005
ACM
14 years 2 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
HPCC
2005
Springer
14 years 2 months ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...