Sciweavers

Share
IFIP
2010
Springer
8 years 4 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
IFIP
2010
Springer
8 years 4 months ago
Security Analysis of the MPLS Label Distribution Protocol
Daniel Guernsey, Aaron Engel, Jonathan Butts, Suje...
IFIP
2010
Springer
8 years 4 months ago
Resource Adaptive Distributed Information Sharing
We have designed, implemented and evaluated a resource adaptive distributed information sharing system where automatic adjustments are made internally in our information sharing sy...
Hans Vatne Hansen, Vera Goebel, Thomas Plagemann, ...
IFIP
2010
Springer
8 years 4 months ago
Reasoning about Skills and Competencies
Human Resources Management (HRM) is the strategic management of the employees, who individually and collectively contribute to the achievement of the strategic goals of an organiza...
Maryam Fazel-Zarandi, Mark S. Fox
IFIP
2010
Springer
8 years 4 months ago
Autonomic Approach to Planning and Scheduling in Networked Small Factories
The paper considers the complex behavior of a small company in a business ecosystem, time by time leader or supplier or both in one or more supply chains, and points out the data e...
Flavio Bonfatti, Luca Martinelli, Paola Daniela Mo...
IFIP
2010
Springer
8 years 4 months ago
Evaluation of Evidence in Internet Auction Fraud Investigations
Abstract Internet auction fraud has become prevalent. Methodologies for detecting fraudulent transactions use historical information about Internet auction participants to decide w...
Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Ch...
books