Sciweavers

2924 search results - page 441 / 585
» On the Use of Evidence in Neural Networks
Sort
View
CN
2007
179views more  CN 2007»
15 years 1 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
INTELLCOMM
2004
Springer
15 years 7 months ago
An Implementation of Indoor Location Detection Systems Based on Identifying Codes
We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beac...
Rachanee Ungrangsi, Ari Trachtenberg, David Starob...
141
Voted
DIALM
2005
ACM
130views Algorithms» more  DIALM 2005»
15 years 3 months ago
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
Wireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for exam...
Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
100
Voted
CORR
2010
Springer
82views Education» more  CORR 2010»
15 years 1 months ago
Expansion and Search in Networks
Borrowing from concepts in expander graphs, we study the expansion properties of real-world, complex networks (e.g. social networks, unstructured peer-to-peer or P2P networks) and...
Arun S. Maiya, Tanya Y. Berger-Wolf
87
Voted
FLAIRS
2006
15 years 3 months ago
Introducing GEMS - A Novel Technique for Ensemble Creation
The main contribution of this paper is to suggest a novel technique for automatic creation of accurate ensembles. The technique proposed, named GEMS, first trains a large number o...
Ulf Johansson, Tuve Löfström, Rikard K&o...