Sciweavers

5990 search results - page 1095 / 1198
» The Sampling Analysis Pattern
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
INFOCOM
2011
IEEE
14 years 1 months ago
User-centric data dissemination in disruption tolerant networks
Abstract—Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user...
Wei Gao, Guohong Cao
PRL
2011
14 years 28 days ago
Structural matching of 2D electrophoresis gels using deformed graphs
2D electrophoresis is a well known method for protein separation which is extremely useful in the field of proteomics. Each spot in the image represents a protein accumulation an...
Alexandre Noma, Alvaro Pardo, Roberto Marcondes Ce...
ASUNAM
2011
IEEE
13 years 10 months ago
SCENE: Structural Conversation Evolution NEtwork
—It’s not just what you say, but it is how you say it. To date, the majority of the Instant Message (IM) analysis and research has focused on the content of the conversation.Th...
Marina Danilevsky, Joshua M. Hailpern, Jiawei Han
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
13 years 5 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
« Prev « First page 1095 / 1198 Last » Next »