Sciweavers

1410 search results - page 202 / 282
» Performance Analysis for a Two-Ring Distributed MIMO-OFDM Sy...
Sort
View
142
Voted
CCS
2010
ACM
15 years 5 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
IPPS
2007
IEEE
15 years 10 months ago
Bi-criteria Scheduling Algorithm with Deployment in Cluster
Computational grids clusters, provide powerful computing resources for executing applications of large scale. In Grid (clusters) usually several applications run simultaneously.Th...
Feryal-Kamila Moulaï, Gregory Mounie
CCGRID
2006
IEEE
15 years 10 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
IPPS
2006
IEEE
15 years 10 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
DCOSS
2005
Springer
15 years 9 months ago
Multi-query Optimization for Sensor Networks
The widespread dissemination of small-scale sensor nodes has sparked interest in a powerful new database abstraction for sensor networks: Clients “program” the sensors through ...
Niki Trigoni, Yong Yao, Alan J. Demers, Johannes G...