Sciweavers

1748 search results - page 188 / 350
» Security Models for Heterogeneous Networking
Sort
View
MOBIHOC
2008
ACM
16 years 3 months ago
Bubble rap: social-based forwarding in delay tolerant networks
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket S...
Pan Hui, Jon Crowcroft, Eiko Yoneki
CAISE
2006
Springer
15 years 7 months ago
Context-aware Applications with Distributed Ontologies
This paper presents a framework for context-aware applications, with a particular focus on collaboration and pervasiveness. The framework relies on distributed ontologies, which ar...
Flavio De Paoli, Marco Loregian
JUCS
2010
217views more  JUCS 2010»
15 years 2 months ago
The 3A Personalized, Contextual and Relation-based Recommender System
Abstract: This paper discusses the 3A recommender system that targets CSCL (computersupported collaborative learning) and CSCW (computer-supported collaborative work) environments....
Sandy El Helou, Christophe Salzmann, Denis Gillet
CCS
2009
ACM
16 years 4 months ago
A generic construction of useful client puzzles
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
ACSAC
2008
IEEE
15 years 10 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...