Sciweavers

1244 search results - page 235 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
JUCS
2008
166views more  JUCS 2008»
14 years 11 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
ICASSP
2011
IEEE
14 years 3 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
MOBISYS
2009
ACM
16 years 8 days ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 6 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
TWC
2010
14 years 6 months ago
Outage Probability Analysis of Cognitive Transmissions: Impact of Spectrum Sensing Overhead
In cognitive radio networks, a cognitive source node requires two essential phases to complete a cognitive transmission process: the phase of spectrum sensing with a certain time d...
YuLong Zou, Yu-Dong Yao, Baoyu Zheng