ATC C

53 papers

YearTitle / Authors
2008A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards.
Xiaogang Wang, Darren Xu, Junzhou Luo
2008A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter.
Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang
2008A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily.
Stefano Bistarelli, Fabio Martinelli, Francesco Santini
2008A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments.
Mohsen Taherian, Rasool Jalili, Morteza Amini
2008A Study of Information Security Practice in a Critical Infrastructure Application.
Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel
2008A Trusted Group Signature Architecture in Virtual Computing Environment.
Deqing Zou, Yunfa Li, Song Wu, Weizhong Qiang
2008A User Behavior Based Trust Model for Mobile Applications.
Zheng Yan, Valtteri Niemi, Yan Dong, Guoliang Yu
2008A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks.
Hung-Chi Chu, Yi-Ting Hsu, Yong-Hsun Lai
2008Adaptability of the TRSIM Model to Some Changes in Agents Behaviour.
Alberto Caballero, Juan A. Botía, Antonio Fernandez Gómez-Skarmeta
2008Adjustable Trust Model for Access Control.
Maryna Komarova, Michel Riguidel
2008An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL.
Mike Hinchey, Emil Vassev
2008An Integrated Solution for Policy Filtering and Traffic Anomaly Detection.
Zhijun Wang, Hao Che, Jiannong Cao
2008An Operating System Architecture for Organic Computing in Embedded Real-Time Systems.
Florian Kluge, Jörg Mische, Sascha Uhrig, Theo Ungerer
2008Annotation Markers for Runtime Replication Protocol Selection.
Hein Meling
2008Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots.
Bojan Jakimovski, Erik Maehle
2008Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang
2008Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings
Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang, Jianhua Ma
2008Autonomous Querying for Knowledge Networks.
Kieran Greer, Matthias Baumgarten, Chris D. Nugent, Maurice D. Mulvenna, Kevin Curran
2008Concepts for Autonomous Control Flow Checking for Embedded CPUs.
Daniel Ziener, Jürgen Teich
2008Cooperative Management Framework for Inter-domain Routing System.
Ning Hu, Peng Zou, Peidong Zhu, Xin Liu
2008Design, Prototype, and Evaluation of a Network Monitoring Library.
Karl-André Skevik, Vera Goebel, Thomas Plagemann
2008Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching.
Jianhua Yang, Byong Lee
2008Di-GAFR: Directed Greedy Adaptive Face-Based Routing.
Tao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong
2008Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database.
Juryon Paik, Junghyun Nam, Hee Yong Youn, Ung-Mo Kim
2008Distributed Performance Control in Organic Embedded Systems.
Steffen Stein, Rolf Ernst
2008Embedding Dynamic Behaviour into a Self-configuring Software System.
Paul Ward, Mariusz Pelc, James Hawthorne, Richard John Anthony
2008Enhanced Three-Round Smart Card-Based Key Exchange Protocol.
Eun-Jun Yoon, Kee-Young Yoo
2008Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server.
Lin-Huang Chang, Chun-Hui Sung, Shih-Yi Chiu, Jiun-Jian Liaw
2008Managing Contracts in Pleiades Using Trust Management.
Christoffer Norvik, John P. Morrison, Dan C. Marinescu, Chen Yu, Gabriela M. Marinescu, Howard Jay Siegel
2008Maximising Personal Utility Using Intelligent Strategy in Minority Game.
Yingni She, Ho-fung Leung
2008Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation.
Christoph Dorn, Hong Linh Truong, Schahram Dustdar
2008Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose.
Sirui Yang, Hai Jin, Xiaofei Liao, Sanmin Liu
2008Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes.
Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi
2008Organic Control of Traffic Lights.
Holger Prothmann, Fabian Rochner, Sven Tomforde, Jürgen Branke, Christian Müller-Schloer, Hartmut Schmeck
2008Performance Problem Determination Using Combined Dependency Analysis for Reliable System.
Shunshan Piao, Jeongmin Park, Eunseok Lee
2008Preventing DDoS Attacks Based on Credit Model for P2P Streaming System.
Jun Yang, Ying Li, Benxiong Huang, Jiuqiang Ming
2008Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN.
Gaeil An, Kiyoung Kim
2008SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks.
Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong
2008Scheduling for Reliable Execution in Autonomic Systems.
Terry Tidwell, Robert Glaubius, Christopher D. Gill, William D. Smart
2008Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes.
Armando Astarloa, Unai Bidarte, Jaime Jimenez, Jesús Lázaro, Iñigo Martínez de Alegría
2008Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations.
Martin Gilje Jaatun, Tor Olav Grøtan, Maria B. Line
2008Self-reconfiguration in Highly Available Pervasive Computing Systems.
Hadi Hemmati, Rasool Jalili
2008Sensor Network Applications Implemented by Industry and Their Security Challenges.
Erdal Cayirci
2008SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks.
Xiaowei Chen, Kaiyong Zhao, Xiaowen Chu
2008Service Discovery of IP Cameras Using SIP and Zeroconf Protocols.
Yi-Chih Tung, Chien-Min Ou, Wen-Jyi Hwang, Wei-De Wu
2008Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation.
Hiroyuki Eto, Tadashi Dohi, Jianhua Ma
2008Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering.
Chunmei Gui, Quanyuan Wu, Huaimin Wang, Jian Qiang
2008Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks.
Reinhard Mörgenthaler, Markus Zeller, Josef Jiru
2008Trusting Groups in Coalition Formation Using Social Distance.
Peter Shaw, Paul Sage, Peter Milligan
2008Using Automated Planning for Trusted Self-organising Organic Computing Systems.
Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer
2008Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network.
Furong Wang, Yipeng Qu, Baoming Bai, Fan Zhang, Chen Huang
2008Web Search Results Clustering Based on a Novel Suffix Tree Structure.
Junze Wang, Yijun Mo, Benxiong Huang, Jie Wen, Li He
2008Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems.
Yue-Shan Chang, Tong-Ying Juang, Chen-Yi Su