Sciweavers

280 search results - page 19 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
DPD
2000
93views more  DPD 2000»
15 years 2 months ago
Ontological Approach for Information Discovery in Internet Databases
The Internet has solved the age-old problem of network connectivity and thus enabling the potential access to, and data sharing among large numbers of databases. However, enabling ...
Mourad Ouzzani, Boualem Benatallah, Athman Bouguet...
PERCOM
2011
ACM
14 years 6 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
150
Voted
PERVASIVE
2007
Springer
15 years 8 months ago
PersonisAD: Distributed, Active, Scrutable Model Framework for Context-Aware Services
Abstract. PersonisAD, is a framework for building context-aware, ubiquitous applications: its defining foundation is a consistent mechanism for scrutable modelling of people, sens...
Mark Assad, David J. Carmichael, Judy Kay, Bob Kum...
98
Voted
IPCCC
2007
IEEE
15 years 8 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
GCC
2005
Springer
15 years 8 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao