Sciweavers

1266 search results - page 42 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PERCOM
2003
ACM
15 years 11 months ago
Evaluation of Kalman Filtering for Network Time Keeping
Time information is critical for a variety of applications in distributed environments that facilitate pervasive computing and communication. This work describes and evaluates a no...
Aggelos Bletsas
PERCOM
2008
ACM
14 years 11 months ago
Peer-to-Peer Context Reasoning in Pervasive Computing Environments
In this paper, we propose a peer-to-peer approach to derive and obtain additional context data from lowlevel context data that may be spread over multiple domains in pervasive com...
Tao Gu, Hung Keng Pung, Daqing Zhang
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
15 years 5 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
TNN
2008
152views more  TNN 2008»
14 years 11 months ago
Distributed Parallel Support Vector Machines in Strongly Connected Networks
We propose a distributed parallel support vector machine (DPSVM) training mechanism in a configurable network environment for distributed data mining. The basic idea is to exchange...
Yumao Lu, Vwani P. Roychowdhury, L. Vandenberghe
MOBICOM
2004
ACM
15 years 5 months ago
Performance evaluation of safety applications over DSRC vehicular ad hoc networks
In this paper we conduct a feasibility study of delay-critical safety applications over vehicular ad hoc networks based on the emerging dedicated short range communications (DSRC)...
Jijun Yin, Tamer A. ElBatt, Gavin Yeung, Bo Ryu, S...