Sciweavers

109 search results - page 19 / 22
» comcom 2006
Sort
View
COMCOM
2006
95views more  COMCOM 2006»
13 years 5 months ago
E-Span and LPT for data aggregation in wireless sensor networks
In wireless sensor networks (WSNs), when a stimulus or event is detected within a particular region, data reports from the neighboring sensor nodes (sources) are sent to the sink ...
Weinan Marc Lee, Vincent W. S. Wong
COMCOM
2006
147views more  COMCOM 2006»
13 years 5 months ago
Coverage-adaptive random sensor scheduling for application-aware data gathering in wireless sensor networks
Due to the application-specific nature of wireless sensor networks, application-aware algorithm and protocol design paradigms are highly required in order to optimize the overall ...
Wook Choi, Sajal K. Das
COMCOM
2006
88views more  COMCOM 2006»
13 years 5 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
COMCOM
2006
154views more  COMCOM 2006»
13 years 5 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
COMCOM
2006
67views more  COMCOM 2006»
13 years 5 months ago
Performance analyses of three geography-based location strategies for PCS networks
Although many location schemes have been proposed and analyzed, the tradeoff among the location registration and the call delivery of different schemes and the relative performanc...
Wei Kuang Lai, Nian-Chin Wu