Sciweavers

631 search results - page 109 / 127
» Gossips: System and Service Monitor
Sort
View
COMSWARE
2006
IEEE
14 years 3 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
ICDCS
2006
IEEE
14 years 3 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
ATAL
2005
Springer
14 years 3 months ago
Agent-based virtual organisations for the Grid
The ability to create reliable and scalable virtual organisations (VOs) on demand in a dynamic, open and competitive environment is one of the major challenges that underlie Grid ...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...
IUI
2004
ACM
14 years 3 months ago
Supporting user hypotheses in problem diagnosis
People are performing increasingly complicated actions on the web, such as automated purchases involving multiple sites. Things often go wrong, however, and it can be difficult to...
Earl J. Wagner, Henry Lieberman