Sciweavers

129 search results - page 23 / 26
» An Open Approach for Designing Secure Electronic Immobilizer...
Sort
View
SECPERU
2006
IEEE
14 years 2 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
CP
2008
Springer
13 years 9 months ago
Search Strategies for Rectangle Packing
Rectangle (square) packing problems involve packing all squares with sizes 1 × 1 to n × n into the minimum area enclosing rectangle (respectively, square). Rectangle packing is a...
Helmut Simonis, Barry O'Sullivan
BMCBI
2008
150views more  BMCBI 2008»
13 years 8 months ago
BibGlimpse: The case for a light-weight reprint manager in distributed literature research
Background: While text-mining and distributed annotation systems both aim at capturing knowledge and presenting it in a standardized form, there have been few attempts to investig...
Thomas Tüchler, Golda Velez, Alexandra Graf, ...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 1 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 8 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...