Sciweavers

1583 search results - page 245 / 317
» The Quorum Deployment Problem
Sort
View
IEEESP
2010
99views more  IEEESP 2010»
14 years 8 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
IJCAT
2010
132views more  IJCAT 2010»
14 years 8 months ago
Using weaving models to automate model-driven web engineering proposals
The impact of Model-Driven Software Development in Web Engineering has given raise to the advent of Model-Driven Web Engineering, a new approach for Web Information Systems develop...
Juan M. Vara, Valeria de Castro, Marcos Didonet De...
IJWET
2010
83views more  IJWET 2010»
14 years 8 months ago
Technically approaching the semantic web bottleneck
: After several years of research, the fundamental Semantic Web technologies have reached a high maturity level. Nevertheless, the average Web user has not yet taken advantage of t...
Nikolaos Konstantinou, Dimitrios-Emmanuel Spanos, ...
INFOCOM
2010
IEEE
14 years 8 months ago
Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments
—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
Stanislav Miskovic, Edward W. Knightly
INFOCOM
2010
IEEE
14 years 8 months ago
Understanding Node Localizability of Wireless Ad-hoc Networks
— Location awareness is highly critical for wireless ad-hoc and sensor networks. Many efforts have been made to solve the problem of whether or not a network can be localized. Ne...
Zheng Yang, Yunhao Liu