Sciweavers

3451 search results - page 33 / 691
» Collaborative attack modeling
Sort
View
WISE
2010
Springer
13 years 6 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
IADIS
2009
13 years 6 months ago
Rendezvous-based associations: Language abstractions for robot collaboration
IONS FOR ROBOT COLLABORATION Bent Bruun Kristensen Maersk Mc-Kinney Moller Institute, University of Southern Denmark Campusvej 55, DK-5230, Odense M, Denmark Collaboration between...
Bent Bruun Kristensen
WETICE
2006
IEEE
14 years 2 months ago
Modelling of Complex Supply Networks
In order to capture the increased complexity of products and production processes as well as market requirements, collaboration models representing organisational networks enable ...
Georg Weichhart, Christian Stary, Stefan Oppl
APCHI
2008
IEEE
14 years 3 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
ACSAC
2005
IEEE
14 years 2 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner