Sciweavers

450 search results - page 43 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
AINA
2008
IEEE
15 years 4 months ago
An Analytical Study of Wireless Error Models for Bluetooth Networks
Data transmission over wireless networks is challenging due to the occurrence of burst errors, and packet loss caused by such errors seriously limits the maximum achievable throug...
Hao-Hsiang Hung, Ling-Jyh Chen
IAT
2008
IEEE
15 years 4 months ago
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...
Touhid Bhuiyan, Yue Xu, Audun Jøsang
ISNN
2007
Springer
15 years 3 months ago
Integrated Analytic Framework for Neural Network Construction
Abstract. This paper investigates the construction of a wide class of singlehidden layer neural networks (SLNNs) with or without tunable parameters in the hidden nodes. It is a cha...
Kang Li, Jian Xun Peng, Minrui Fei, Xiaoou Li, Wen...
TMC
2010
190views more  TMC 2010»
14 years 8 months ago
SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
—Wireless sensor networks have been used to gather data and information in many diverse application settings. The capacity of such networks remains a fundamental obstacle toward ...
Emad Felemban, Serdar Vural, Robert Murawski, Eyle...
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
15 years 10 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...