Sciweavers

232 search results - page 40 / 47
» Evaluation of Ad Hoc OLAP: In-Place Computation
Sort
View
DCOSS
2010
Springer
15 years 23 days ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
RAID
2009
Springer
15 years 4 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
ICPADS
2002
IEEE
15 years 2 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
COORDINATION
2008
Springer
14 years 11 months ago
CiAN: A Workflow Engine for MANETs
Most mature workflow management systems (WfMSs) available today execute workflows via orchestration of an available set of services, a process in which a central coordinating enti...
Rohan Sen, Gruia-Catalin Roman, Christopher D. Gil...
SEMCO
2008
IEEE
15 years 3 months ago
Serving the Sky: Discovering and Selecting Semantic Web Services through Dynamic Skyline Queries
Semantic Web service descriptions are typically multiparameter constructs. Discovering semantically relevant services, given a desirable service description, is typically addresse...
Dimitrios Skoutas, Dimitris Sacharidis, Alkis Simi...