Sciweavers

361 search results - page 53 / 73
» Toward a Query Language for Network Attack Data
Sort
View
SAC
2009
ACM
14 years 2 months ago
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang
SASN
2006
ACM
14 years 1 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
WWW
2004
ACM
14 years 8 months ago
RDFPeers: a scalable distributed RDF repository based on a structured peer-to-peer network
Centralized Resource Description Framework (RDF) repositories have limitations both in their failure tolerance and in their scalability. Existing Peer-to-Peer (P2P) RDF repositori...
Min Cai, Martin R. Frank
NGITS
1993
Springer
13 years 12 months ago
AMOS - An Architecture for Active Mediators
AMOS (Active Mediators Object System) is an architecture to model, locate, search, combine, update, and monitor data in information systems with many work stations connected using...
Gustav Fahl, Tore Risch, Martin Sköld
CASCON
1996
113views Education» more  CASCON 1996»
13 years 9 months ago
Network management views using delegated agents
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
Germán S. Goldszmidt