Sciweavers

3528 search results - page 563 / 706
» A New Approach to Planning in Networks
Sort
View
DMSN
2009
ACM
15 years 4 months ago
Message models and aggregation in knowledge based middleware for rich sensor systems
Networked, distributed real world sensing is an increasingly prominent topic in computing and has quickly expanded from resource constrained “sensor networks” measuring simple...
Joseph B. Kopena, William C. Regli, Boon Thau Loo
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 4 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
SENSYS
2003
ACM
15 years 3 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
ISCA
2008
IEEE
119views Hardware» more  ISCA 2008»
14 years 10 months ago
Technology-Driven, Highly-Scalable Dragonfly Topology
Evolving technology and increasing pin-bandwidth motivate the use of high-radix routers to reduce the diameter, latency, and cost of interconnection networks. High-radix networks,...
John Kim, William J. Dally, Steve Scott, Dennis Ab...