Sciweavers

2047 search results - page 336 / 410
» Pervasive Computing on Active Networks
Sort
View
IJCNN
2008
IEEE
15 years 10 months ago
Adaptation of barn owl localization system with spike timing dependent plasticity
— To localize a seen object, the superior colliculus of the barn owl integrates the visual and auditory localization cues which are accessed from the sensory system of the brain....
Juan Huo, Alan F. Murray, Leslie Smith, Zhijun Yan...
ACSAC
2007
IEEE
15 years 10 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ICCCN
2007
IEEE
15 years 10 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
WIOPT
2005
IEEE
15 years 9 months ago
Performance Measurements of the Saturation Throughput in IEEE 802.11 Access Points
— Performance measurements of IEEE 802.11 access points provide important information for networking research and network management. In this paper, we present an active measurem...
Enrico Pelletta, Hector Velayos
ICN
2005
Springer
15 years 9 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...