Sciweavers

3451 search results - page 121 / 691
» Collaborative attack modeling
Sort
View
117
Voted
WCNC
2010
IEEE
15 years 6 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
106
Voted
ESWS
2007
Springer
15 years 8 months ago
Developing Ontologies for Collaborative Engineering in Mechatronics
Abstract. Creating a coherent set of ontologies to support a collaborative design process amongst different firms which develop mechatronic products is a challenge due to the seman...
Violeta Damjanovic, Wernher Behrendt, Manuela Pl&o...
ICIS
2003
15 years 3 months ago
Leveraging Information Sharing to Increase Supply Chain Configurability
As supply chains evolve beyond the confines of individual organizations, collaboration has become the Holy Grail in supply chain technology. It plays a key role in achieving flexi...
Emily "Rong" Liu, Akhil Kumar
SECON
2008
IEEE
15 years 8 months ago
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
—Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
123
Voted
SC
2009
ACM
15 years 9 months ago
Building the PolarGrid portal using web 2.0 and OpenSocial
Science requires collaboration. In this paper, we investigate the feasibility of coupling current social networking techniques to science gateways to provide a scientific collabor...
Zhenhua Guo, Raminderjeet Singh, Marlon E. Pierce