Sciweavers

12863 search results - page 2225 / 2573
» Dynamic Data Mining
Sort
View
149
Voted
AINA
2008
IEEE
15 years 11 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
FGR
2008
IEEE
255views Biometrics» more  FGR 2008»
15 years 11 months ago
Aligned Cluster Analysis for temporal segmentation of human motion
Temporal segmentation of human motion into actions is a crucial step for understanding and building computational models of human motion. Several issues contribute to the challeng...
Feng Zhou, Fernando De la Torre, Jessica K. Hodgin...
IAT
2008
IEEE
15 years 11 months ago
Link-Based Anomaly Detection in Communication Networks
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
KBSE
2008
IEEE
15 years 11 months ago
Self-healing strategies for component integration faults
Software systems increasingly integrate Off-The-Shelf (OTS) components. However, due to the lack of knowledge about the reused OTS components, this integration is fragile and can ...
Hervé Chang, Leonardo Mariani, Mauro Pezz&e...
MOBIQUITOUS
2008
IEEE
15 years 11 months ago
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
Heterogeneous applications could be assimilated within the same wireless sensor network with the aid of modern motes that have multiple sensor boards on a single radio board. Diff...
Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-S...
« Prev « First page 2225 / 2573 Last » Next »