Sciweavers

1075 search results - page 134 / 215
» Communities Detection in Large Networks
Sort
View
DSN
2005
IEEE
15 years 3 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
PIMRC
2010
IEEE
14 years 7 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
HUC
2010
Springer
14 years 10 months ago
Tasking networked CCTV cameras and mobile phones to identify and localize multiple people
We present a method to identify and localize people by leveraging existing CCTV camera infrastructure along with inertial sensors (accelerometer and magnetometer) within each pers...
Thiago Teixeira, Deokwoo Jung, Andreas Savvides
IJCNN
2000
IEEE
15 years 2 months ago
A Constraint Learning Algorithm for Blind Source Separation
In Jutten’s blind separation algorithm, symmetrical distribution and statistical independence of the signal sources are assumed. When they are not satisfied, the learning proce...
Kenji Nakayama, Akihiro Hirano, Motoki Nitta
IJHPCN
2006
109views more  IJHPCN 2006»
14 years 9 months ago
Communication issues within high performance computing grids
: This paper presents several ideas pertaining to desirable properties associated with protocols for moving large amounts of data over a grid of high performance computers. The pro...
Robert D. McLeod, Sajid Hussain, Sheng Huang, Mare...