Sciweavers

4190 search results - page 596 / 838
» Implementing commitment-based interactions
Sort
View
124
Voted
AINA
2008
IEEE
15 years 10 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
166
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 10 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
133
Voted
COMPSAC
2008
IEEE
15 years 10 months ago
A Component-Based Model and Language for Wireless Sensor Network Applications
Wireless sensor networks are often used by experts in many different fields to gather data pertinent to their work. Although their expertise may not include software engineering, ...
Alan Dearle, Dharini Balasubramaniam, Jonathan Lew...
CRV
2008
IEEE
192views Robotics» more  CRV 2008»
15 years 10 months ago
Realtime Visualization of Monocular Data for 3D Reconstruction
Methods for reconstructing photorealistic 3D graphics models from images or video are appealing applications of computer vision. Such methods rely on good input image data, but th...
Adam Rachmielowski, Neil Birkbeck, Martin Jäg...
DSD
2008
IEEE
130views Hardware» more  DSD 2008»
15 years 10 months ago
On the Need for Passive Monitoring in Sensor Networks
—Debugging and analyzing Wireless Sensor Networks (WSNs) are important tasks for improving the quality and performance of the network. In this paper, Pimoto is to be presented, w...
Abdalkarim Awad, Rodrigo Nebel, Reinhard German, F...