Sciweavers

3274 search results - page 568 / 655
» Communication strategies in games
Sort
View
CCS
2009
ACM
15 years 6 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
EDBT
2009
ACM
104views Database» more  EDBT 2009»
15 years 6 months ago
A query processor for prediction-based monitoring of data streams
Networks of sensors are used in many different fields, from industrial applications to surveillance applications. A common feature of these applications is the necessity of a mo...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...
GLOBECOM
2009
IEEE
15 years 6 months ago
A Decentralized Framework for Dynamic Downlink Base Station Cooperation
— Multiple Base Station (Multi-BS) cooperation has been considered as a promising mechanism to suppress cochannel interference and boost the capacity for cellular networks. Howev...
Sheng Zhou, Jie Gong, Zhisheng Niu, Yunjian Jia, P...
GLOBECOM
2009
IEEE
15 years 6 months ago
Linear Beamforming for Multiuser MIMO Downlink Systems with Channel Orthogonalization
— Recently linear processing strategies have been developed to approach the optimum performance of dirty paper coding with low complexity in multiuser multiple-input multipleoutp...
Jin-Sung Kim, Sung Hyun Moon, Inkyu Lee
GLOBECOM
2009
IEEE
15 years 6 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali