Sciweavers

671 search results - page 103 / 135
» Trust evaluation in ad-hoc networks
Sort
View
IWSEC
2010
Springer
13 years 9 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
IFIPTM
2009
171views Management» more  IFIPTM 2009»
13 years 8 months ago
Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration
Trust has been explored by many researchers in the past as a solution for assisting the process of recommendation production. In this work we are examining the feasibility of build...
Georgios Pitsilis
RAID
2009
Springer
14 years 5 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
14 years 5 months ago
ACLE: A Communication Environment for Asynchronous Collaborative Learning
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (...
Timothy J. Ellis, William Hafner
ICAC
2006
IEEE
14 years 5 months ago
Enabling Self-Managing Applications using Model-based Online Control Strategies
— The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt t...
Viraj Bhat, Manish Parashar, Hua Liu, Mohit Khande...