Sciweavers

3451 search results - page 157 / 691
» Collaborative attack modeling
Sort
View
148
Voted
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
15 years 19 days ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
97
Voted
EUSFLAT
2003
103views Fuzzy Logic» more  EUSFLAT 2003»
15 years 4 months ago
Instance-based collaborative filtering with fuzzy labels
In recommender systems, user ratings of items are often represented in terms of linguistic labels such as “fair” or “very good”. We investigate the potential of fuzzy sets...
Eyke Hüllermeier
112
Voted
CERA
2002
111views more  CERA 2002»
15 years 2 months ago
Collaborative Engineering Design Based on an Intelligent STEP Database
: A pilot system has been developed to promote the collaborative engineering design on the Internet. Product models are stored in a shared database which is formatted according to ...
Soonhung Han, Young Choi, Sangbong Yoo, Namkyu Par...
113
Voted
WISEC
2010
ACM
15 years 9 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
135
Voted
IJNSEC
2007
157views more  IJNSEC 2007»
15 years 2 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai