Sciweavers

2380 search results - page 414 / 476
» Distributed detection in a large wireless sensor network
Sort
View
135
Voted
IJCNN
2000
IEEE
15 years 8 months ago
A Constraint Learning Algorithm for Blind Source Separation
In Jutten’s blind separation algorithm, symmetrical distribution and statistical independence of the signal sources are assumed. When they are not satisfied, the learning proce...
Kenji Nakayama, Akihiro Hirano, Motoki Nitta
INFOCOM
2005
IEEE
15 years 9 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...
IWIA
2005
IEEE
15 years 9 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
WCNC
2008
IEEE
15 years 10 months ago
Adaptive Routing in Dynamic Ad Hoc Networks
Abstract—Dynamic ad hoc networks are mobile ad hoc networks (MANETs) where network characteristics, such as network density and node mobility, change significantly over time and...
Cong Liu, Jie Wu
IPPS
2007
IEEE
15 years 10 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai