Sciweavers

1737 search results - page 264 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
BIOINFORMATICS
2005
152views more  BIOINFORMATICS 2005»
15 years 2 months ago
Intervention in context-sensitive probabilistic Boolean networks
Motivation: Intervention in a gene regulatory network is used to help it avoid undesirable states, such as those associated with a disease. Several types of intervention have been...
Ranadip Pal, Aniruddha Datta, Michael L. Bittner, ...
TROB
2010
176views more  TROB 2010»
14 years 9 months ago
Modeling Deformations of General Parametric Shells Grasped by a Robot Hand
The robot hand applying force on a deformable object will result in a changing wrench space due to the varying shape and normal of the contact area. Design and analysis of a manipu...
Jiang Tian, Yan-Bin Jia
INFOCOM
2008
IEEE
15 years 9 months ago
Area Avoidance Routing in Distance-Vector Networks
Network routing may be required, under certain applications, to avoid certain areas (or nodes) These areas can be of potential security threat, possess poor quality or have other ...
Haim Zlatokrilov, Hanoch Levy
167
Voted
ESAS
2004
Springer
15 years 6 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
144
Voted
IEEEARES
2010
IEEE
15 years 9 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...