Sciweavers

280 search results - page 19 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
DPD
2000
93views more  DPD 2000»
13 years 7 months ago
Ontological Approach for Information Discovery in Internet Databases
The Internet has solved the age-old problem of network connectivity and thus enabling the potential access to, and data sharing among large numbers of databases. However, enabling ...
Mourad Ouzzani, Boualem Benatallah, Athman Bouguet...
PERCOM
2011
ACM
12 years 11 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
PERVASIVE
2007
Springer
14 years 1 months ago
PersonisAD: Distributed, Active, Scrutable Model Framework for Context-Aware Services
Abstract. PersonisAD, is a framework for building context-aware, ubiquitous applications: its defining foundation is a consistent mechanism for scrutable modelling of people, sens...
Mark Assad, David J. Carmichael, Judy Kay, Bob Kum...
IPCCC
2007
IEEE
14 years 2 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
GCC
2005
Springer
14 years 1 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao