Sciweavers

4376 search results - page 845 / 876
» Data Management in Sensor Networks
Sort
View
IWIA
2005
IEEE
15 years 3 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
OTM
2005
Springer
15 years 3 months ago
Life Science Grid Middleware in a More Dynamic Environment
This paper proposes a model for integrating a higher level Semantic Grid Middleware with Web Service Resource Framework (WSRF) that extends the prototype presented in [1] informed ...
Milena Radenkovic, Bartosz Wietrzyk
SPC
2005
Springer
15 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
WAC
2005
Springer
123views Communications» more  WAC 2005»
15 years 3 months ago
Service Evolution in a Nomadic Wireless Environment
Abstract. In this paper, we present and analyze a framework for selfevolving autonomic services in a wireless nomadic environment. We present a disconnected network architecture, w...
Iacopo Carreras, Francesco De Pellegrini, Daniele ...
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 3 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy