Sciweavers

167 search results - page 22 / 34
» A distributed scheme for detection of information flows
Sort
View
RAID
1999
Springer
13 years 11 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
DPD
2002
100views more  DPD 2002»
13 years 7 months ago
Light-Weight Currency Management Mechanisms in Mobile and Weakly-Connected Environments
This paper discusses the currency management mechanisms used in Deno, a replicated object storage system designed for use in mobile and weakly-connected environments. Deno primari...
Ugur Çetintemel, Peter J. Keleher
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
13 years 9 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
13 years 11 months ago
Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data
Wepresent a novel, fast methodfor associationminingill high-dimensionaldatasets. OurCoincidence Detection method, which combines random sampling and Chernoff-Hoeffding bounds with...
Evan W. Steeg, Derek A. Robinson, Ed Willis
INFOCOM
2007
IEEE
14 years 1 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim