Sciweavers

499 search results - page 81 / 100
» A Study on Latent Vulnerabilities
Sort
View
JPDC
2006
112views more  JPDC 2006»
15 years 12 days ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang
97
Voted
JSW
2007
106views more  JSW 2007»
15 years 9 days ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
TMC
2010
138views more  TMC 2010»
14 years 10 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
107
Voted
SEMWEB
2010
Springer
14 years 10 months ago
Finding the Achilles Heel of the Web of Data: Using Network Analysis for Link-Recommendation
Abstract. The Web of Data is increasingly becoming an important infrastructure for such diverse sectors as entertainment, government, ecommerce and science. As a result, the robust...
Christophe Guéret, Paul T. Groth, Frank van...
108
Voted
USS
2010
14 years 10 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel