Sciweavers

511 search results - page 69 / 103
» Anomaly-Based Intrusion Detection Algorithms for Wireless Ne...
Sort
View
134
Voted
MOBIHOC
2008
ACM
16 years 1 months ago
Strong barrier coverage of wireless sensor networks
Constructing sensor barriers to detect intruders crossing a randomly-deployed sensor network is an important problem. Early results have shown how to construct sensor barriers to ...
Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipu...
IPSN
2007
Springer
15 years 8 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
101
Voted
PKDD
2009
Springer
113views Data Mining» more  PKDD 2009»
15 years 8 months ago
Feature Selection for Density Level-Sets
A frequent problem in density level-set estimation is the choice of the right features that give rise to compact and concise representations of the observed data. We present an eļ¬...
Marius Kloft, Shinichi Nakajima, Ulf Brefeld
CCS
2009
ACM
15 years 8 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
ICDCN
2010
Springer
15 years 8 months ago
Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks
Conventional wireless networks employ a contention based channel access mechanism, which not only imposes high latency but also reduces goodput of the network. Lack of interference...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...