Sciweavers

120 search results - page 2 / 24
» Group detection in mobility traces
Sort
View
IPPS
2009
IEEE
13 years 11 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
JDCTA
2010
139views more  JDCTA 2010»
12 years 11 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
HUC
2011
Springer
12 years 4 months ago
iBAT: detecting anomalous taxi trajectories from GPS traces
GPS-equipped taxis can be viewed as pervasive sensors and the large-scale digital traces produced allow us to reveal many hidden “facts” about the city dynamics and human beha...
Daqing Zhang, Nan Li, Zhi-Hua Zhou, Chao Chen, Lin...
ICRA
2007
IEEE
197views Robotics» more  ICRA 2007»
13 years 11 months ago
Detecting and Tracking Level Sets of Scalar Fields using a Robotic Sensor Network
— We introduce an algorithm which detects and traces a specified level set of a scalar field (a contour) on a plane. A network of static sensor nodes with limited communication...
Karthik Dantu, Gaurav S. Sukhatme
ICPR
2008
IEEE
13 years 11 months ago
Automatic extraction of natural fracture traces from borehole images
Natural fractures may greatly affect wellbore stability and fluid flow in oil reservoirs. The detection of fracture heterogeneities—also named fracture traces—on electrical im...
Josselin Kherroubi