Sciweavers

1295 search results - page 184 / 259
» Technology Challenges in a Data Warehouse
Sort
View
OTM
2009
Springer
14 years 3 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
WETICE
2006
IEEE
14 years 2 months ago
Multi-Dimensional Performance Framework for Enterprise Knowledge Infrastructures
— Within service-oriented business environments, the non-routine processing of requests requires a greater degree of social interaction and learning in order to achieve an effect...
Joe Bolinger, Jay Ramanathan
ITCC
2005
IEEE
14 years 2 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
OTM
2005
Springer
14 years 2 months ago
Modelling Context Information with ORM
Context-aware applications rely on implicit forms of input, such as sensor-derived data, in order to reduce the need for explicit input from users. They are especially relevant for...
Karen Henricksen, Jadwiga Indulska, Ted McFadden
TES
2005
Springer
14 years 2 months ago
Bootstrapping Domain Ontology for Semantic Web Services from Source Web Sites
The vision of Semantic Web services promises a network of interoperable Web services over different sources. A major challenge to the realization of this vision is the lack of aut...
Wensheng Wu, AnHai Doan, Clement T. Yu, Weiyi Meng