Sciweavers

9719 search results - page 1697 / 1944
» Inference for Multiplicative Models
Sort
View
148
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
GLOBECOM
2006
IEEE
15 years 10 months ago
Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading
Abstract— In this paper, we propose asynchronous non-orthogonal communication between distributed sensors and a data fusion center via asynchronous direct-sequence code-division ...
Justin S. Dyer, Balasubramaniam Natarajan, Sudharm...
ICAC
2006
IEEE
15 years 10 months ago
Utility-aware Resource Allocation in an Event Processing System
— Event processing systems link event producers and consumers in a flexible manner, by supporting multiple communication patterns and powerful message transformations. Such syst...
Sumeer Bhola, Mark Astley, Robert Saccone, Michael...
ICDCSW
2006
IEEE
15 years 10 months ago
Reducing Latency in Rendezvous-Based Publish-Subscribe Systems for Wireless Ad Hoc Networks
To ensure decoupling between publishers and subscribers, most publish-subscribe systems route notifications through intermediate message brokers. A byproduct of this practice is ...
Nuno Carvalho, Filipe Araújo, Luís R...
ICDCSW
2006
IEEE
15 years 10 months ago
Improve Searching by Reinforcement Learning in Unstructured P2Ps
— Existing searching schemes in unstructured P2Ps can be categorized as either blind or informed. The quality of query results in blind schemes is low. Informed schemes use simpl...
Xiuqi Li, Jie Wu
« Prev « First page 1697 / 1944 Last » Next »