Sciweavers

4052 search results - page 181 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
138
Voted
MSWIM
2005
ACM
15 years 9 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
124
Voted
GPCE
2004
Springer
15 years 9 months ago
VS-Gen: A Case Study of a Product Line for Versioning Systems
This paper describes our experience with developing a product line for middleware-based versioning systems. We perform a detailed domain analysis and define a DSL for configuring i...
Jernej Kovse, Christian Gebauer
126
Voted
EWSN
2007
Springer
16 years 3 months ago
Versatile Support for Efficient Neighborhood Data Sharing
Many applications in wireless sensor networks rely on data from neighboring nodes. However, the effort for developing efficient solutions for sharing data in the neighborhood is of...
Andreas Lachenmann, Daniel Minder, Kurt Rothermel,...
142
Voted
SYNASC
2005
IEEE
130views Algorithms» more  SYNASC 2005»
15 years 9 months ago
Natural Computation for Business Intelligence from Web Usage Mining
Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical ...
Ajith Abraham
124
Voted
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
15 years 9 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky