Sciweavers

1733 search results - page 143 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
SENSYS
2009
ACM
15 years 8 months ago
A wireless sensor network for border surveillance
We will demonstrate a wireless sensor network system for the surveillance of critical areas and properties – e.g. borders. The system consists of up to 10 sensor nodes that moni...
Denise Dudek, Christian Haas, Andreas Kuntz, Marti...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 2 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
ASUNAM
2010
IEEE
15 years 3 months ago
A Unified Framework for Link Recommendation Using Random Walks
The phenomenal success of social networking sites, such as Facebook, Twitter and LinkedIn, has revolutionized the way people communicate. This paradigm has attracted the attention ...
Zhijun Yin, Manish Gupta, Tim Weninger, Jiawei Han
JCM
2008
196views more  JCM 2008»
15 years 1 months ago
An Energy Optimization Protocol Based on Cross-Layer for Wireless Sensor Networks
Survivability is one of the critical issues and the most important research topics in the fields of wireless sensor networks (WSNs). Energy efficiency is one of the determining fac...
Yuebin Bai, Shujuan Liu, Mo Sha, Yang Lu, Cong Xu
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 8 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...