Sciweavers

2200 search results - page 200 / 440
» Hop Integrity in Computer Networks
Sort
View
ICNS
2007
IEEE
15 years 10 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
MOBIDE
2005
ACM
15 years 9 months ago
Tolerance of localization imprecision in efficiently managing mobile sensor databases
Query processing on mobile sensor networks requires efficient indexing and partitioning of the data space to support efficient routing as the network scales up. Building an index ...
Lin Xiao, Aris M. Ouksel
99
Voted
AINA
2008
IEEE
15 years 10 months ago
A Scheme for Damage Information Gathering Based on Micro Perspective in Sensor Networks
Several systems for disaster damage mitigation have been studied based on various perspectives. Those previous works suggest it is not easy to get an effective method to comprehen...
Takahiro Fujiwara, Takashi Watanabe
ICNS
2007
IEEE
15 years 10 months ago
Data fusion algorithms for network anomaly detection: classification and evaluation
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...
Vasilis Chatzigiannakis, Georgios Androulidakis, K...
113
Voted
DSN
2006
IEEE
15 years 10 months ago
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks
This work presents a failure data analysis campaign on Bluetooth Personal Area Networks (PANs) conducted on two kind of heterogeneous testbeds (working for more than one year). Th...
Marcello Cinque, Domenico Cotroneo, Stefano Russo