Sciweavers

917 search results - page 160 / 184
» The Generalized Trace-Norm and its Application to Structure-...
Sort
View
94
Voted
SASN
2006
ACM
15 years 3 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
76
Voted
SCOPES
2005
Springer
15 years 3 months ago
Language Support for Interoperable Messaging in Sensor Networks
Development of network communication in a homogeneous sensor network environment is straightforward as the nodes can share message layouts simply by letting the compiler lay out m...
Kevin Chang, David Gay
75
Voted
CCS
2004
ACM
15 years 2 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
SIGUCCS
2009
ACM
15 years 2 months ago
Automated lecture recording system with AVCHD camcorder and microserver
Although recording and streaming lecture videos is becoming popular, large-scale lecture recording is still a difficult task for many universities. Auto lecture recording systems ...
Takayuki Nagai
EKAW
2000
Springer
15 years 1 months ago
Torture Tests: A Quantitative Analysis for the Robustness of Knowledge-Based Systems
Abstract. The overall aim of this paper is to provide a general setting for quantitative quality measures of Knowledge-Based System behavior which is widely applicable to many Know...
Perry Groot, Frank van Harmelen, Annette ten Teije