Sciweavers

139 search results - page 26 / 28
» Wireless Intrusion Detection Using Tracking Verification
Sort
View
TSMC
2010
14 years 4 months ago
A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks
-- This paper presents an artificial ant-colony approach to distributed sensor wakeup control in wireless sensor networks (WSN) to accomplish the joint task of surveillance and tar...
Yan Liang, Jiannong Cao, Lei Zhang 0006, Rui Wang,...
IBERAMIA
2004
Springer
15 years 3 months ago
Mobile Robotic Supported Collaborative Learning (MRSCL)
In this paper we describe MRSCL Geometry a collaborative educational activity that explores the use of robotic technology and wirelessly connected Pocket PCs as tools for teaching ...
Rubén Mitnik, Miguel Nussbaum, Alvaro Soto
ANCS
2007
ACM
15 years 1 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
KES
2007
Springer
14 years 9 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 4 months ago
XFA: Faster Signature Matching with Extended Automata
Automata-based representations and related algorithms have been applied to address several problems in information security, and often the automata had to be augmented with additi...
Randy Smith, Cristian Estan, Somesh Jha