Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Khan, Faheem
- Requirement for Computer Support and its Protocols for AVT
Abstract Views :163 |
PDF Views:0
Authors
Affiliations
1 Gandhara University, Peshawar, PK
1 Gandhara University, Peshawar, PK
Source
Oriental Journal of Computer Science and Technology, Vol 5, No 2 (2012), Pagination: 223-230Abstract
Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model. In this paper modeling collaboration processes is presented in which mainly humans are involved. In this paper virtual team agility (VTA) are presented and successfully implemented and the concept of social protocol, combining social networks and workflow models, is proposed as a model. In this paper, the requirements of computer support for virtual team agility (VTA) are presented. Additionally, the concept of social protocol, combining social networks and workflow models, is proposed as a model supporting interactions within agile VT.- A Paper in Mobile Ad-Hoc Networks about Maintaining its Survivability
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Islamia College University, Peshawar, KPK, PK
1 Islamia College University, Peshawar, KPK, PK
Source
Oriental Journal of Computer Science and Technology, Vol 6, No 1 (2013), Pagination: 1-16Abstract
In general, Security techniques pursue two defense lines: one preventive and the second one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to facilitate network s to complete their functions properly and significantly even In the presence of Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established Survivability concepts and its association with preventive, reactive and Tolerance defense lines. Survivable MANETs will be capable to accomplish their purposes and aims by means of the cooperation between those three defense lines. Key Properties of Survivability as resistance, acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs were examined. In conclusion, this function highlights that a completely Survivable MANET be supposed to be appropriate cooperatively the three defense lines as an alternative of only one or two lines separately.Keywords
Survivability, Intrusion Tolerance, MANETs, Security.- Methods and Techniques for the Intrusion Finding in MANET
Abstract Views :161 |
PDF Views:0
Authors
Affiliations
1 Islamia College University, Peshawar, KPK, PK
1 Islamia College University, Peshawar, KPK, PK