Sciweavers

1156 search results - page 178 / 232
» Bayesian Networks for Reliability Analysis of Complex System...
Sort
View
126
Voted
TKDE
2008
125views more  TKDE 2008»
15 years 3 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
155
Voted
CCR
2011
14 years 10 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
110
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
—Tracking of movements such as that of people, animals, vehicles, or of phenomena such as fire, can be achieved by deploying a wireless sensor network. So far only prototype sys...
Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun...
177
Voted
TIP
2010
117views more  TIP 2010»
14 years 10 months ago
Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
Abstract--Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates ...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
155
Voted
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 3 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang