Sciweavers

4511 search results - page 839 / 903
» Observation Based System Security
Sort
View
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 1 months ago
Analytical Evaluation of Fractional Frequency Reuse for OFDMA Cellular Networks
Fractional frequency reuse (FFR) is an interference management technique well-suited to OFDMAbased cellular networks wherein the cells are partitioned into spatial regions with di...
Thomas David Novlan, Radha Krishna Ganti, Arunabha...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
RTSS
2009
IEEE
15 years 4 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 4 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ISCAS
2007
IEEE
161views Hardware» more  ISCAS 2007»
15 years 4 months ago
Hardware Architecture of a Parallel Pattern Matching Engine
Abstract— Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set. This proc...
Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franz...