Sciweavers

2348 search results - page 255 / 470
» Evaluation Patterns of Tele-Haptics
Sort
View
99
Voted
IJDSN
2006
136views more  IJDSN 2006»
15 years 20 days ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
107
Voted
CORR
2007
Springer
92views Education» more  CORR 2007»
15 years 19 days ago
Revisiting the Issues On Netflow Sample and Export Performance
The high volume of packets and packet rates of traffic on some router links makes it exceedingly difficult for routers to examine every packet in order to keep detailed statistics ...
Hamed Haddadi, Raul Landa, Miguel Rio, Saleem N. B...
96
Voted
ISI
2006
Springer
15 years 19 days ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
138
Voted
ISI
2006
Springer
15 years 19 days ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
89
Voted
JCP
2006
118views more  JCP 2006»
15 years 19 days ago
Learning a Classification-based Glioma Growth Model Using MRI Data
Gliomas are malignant brain tumors that grow by invading adjacent tissue. We propose and evaluate a 3D classification-based growth model, CDM, that predicts how a glioma will grow ...
Marianne Morris, Russell Greiner, Jörg Sander...