Sciweavers

2380 search results - page 401 / 476
» Distributed detection in a large wireless sensor network
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 9 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
SIGCOMM
2005
ACM
15 years 10 months ago
ExOR: opportunistic multi-hop routing for wireless networks
This paper describes ExOR, an integrated routing and MAC protocol that increases the throughput of large unicast transfers in multi-hop wireless networks. ExOR chooses each hop of...
Sanjit Biswas, Robert Morris
148
Voted
MOBIHOC
2000
ACM
15 years 8 months ago
Low power rendezvous in embedded wireless networks
ln the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be ver...
Terry Todd, Frazer Bennett, Alan Jones
CORR
2008
Springer
63views Education» more  CORR 2008»
15 years 4 months ago
On the Asymptotic Behavior of Selfish Transmitters Sharing a Common Channel
In a multiple-access communication network, nodes must compete for scarce communication resources such as bandwidth. This paper analyzes the asymptotic behavior of a multipleaccess...
Hazer Inaltekin, Mung Chiang, Harold Vincent Poor,...