Sciweavers

274 search results - page 35 / 55
» Improving vulnerability discovery models
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Anycast Routing in Delay Tolerant Networks
— Anycast routing is very useful for many applications such as resource discovery in Delay Tolerant Networks (DTNs). In this paper, based on a new DTN model, we first analyze th...
Yili Gong, Yongqiang Xiong, Qian Zhang, Zhensheng ...
DBISP2P
2003
Springer
113views Database» more  DBISP2P 2003»
14 years 27 days ago
Structuring Peer-to-Peer Networks Using Interest-Based Communities
Abstract. Interest-based communities are a natural arrangement of distributed systems that prune the search space and allow for better dissemination of information to participating...
Mujtaba Khambatti, Kyung Dong Ryu, Partha Dasgupta
CAISE
2006
Springer
13 years 11 months ago
Towards an Architecture of Ontological Components for the Semantic Web
This paper presents an architecture of ontological components for the Semantic Web. Many methods and methodologies can be found in the literature. Generally, they are dedicated to ...
Nesrine Ben Mustapha, Marie-Aude Aufaure, Hajer Ba...
CIIA
2009
13 years 8 months ago
Towards WSMO Ontology Specification From Existing Web Services
Semantic Web Services (SWSs) aim to improve the possibilities for automated discovery, composition and invocation of Web Services by providing ontology-based service descriptions e...
Houda El Bouhissi, Mimoun Malki, Djelloul Bouchiha
MIDDLEWARE
2009
Springer
14 years 2 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan