Sciweavers

442 search results - page 37 / 89
» Technology choice and timing with positive network effects
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 5 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
JIPS
2007
74views more  JIPS 2007»
14 years 11 months ago
Use of Mobile Devices in the Performance of Group Decision-Making under Contextual Pressure
: Mobile technology appears promising as a method to promote group performance in circumstances dependent on time, but not member proximity. However, the success of mobile technolo...
Oh Byung Kwon, Tae Kyung Kim, Choong Rhyun Kim
EWSN
2007
Springer
15 years 11 months ago
Approximate Initialization of Camera Sensor Networks
Camera sensor networks--wireless networks of low-power imaging sensors--have become popular recently for monitoring applications. In this paper, we argue that traditional vision-ba...
Purushottam Kulkarni, Prashant J. Shenoy, Deepak G...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 6 months ago
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Abstract—Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
BMCBI
2010
176views more  BMCBI 2010»
14 years 12 months ago
Bayesian statistical modelling of human protein interaction network incorporating protein disorder information
Background: We present a statistical method of analysis of biological networks based on the exponential random graph model, namely p2-model, as opposed to previous descriptive app...
Svetlana Bulashevska, Alla Bulashevska, Roland Eil...