Sciweavers

403 search results - page 66 / 81
» Secure multicast in dynamic environments
Sort
View
ISI
2008
Springer
13 years 7 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
ISI
2006
Springer
13 years 7 months ago
Semantic Analytics Visualization
In this paper we present a new tool for semantic analytics through 3D visualization called "Semantic Analytics Visualization" (SAV). It has the capability for visualizing...
Leonidas Deligiannidis, Amit P. Sheth, Boanerges A...
JSS
2008
136views more  JSS 2008»
13 years 7 months ago
Specification, decomposition and agent synthesis for situation-aware service-based systems
Service-based systems are distributed computing systems with the major advantage of enabling rapid composition of distributed applications, such as collaborative research and deve...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
ADHOC
2007
134views more  ADHOC 2007»
13 years 7 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
IFIPTM
2010
140views Management» more  IFIPTM 2010»
13 years 6 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay