Sciweavers

115 search results - page 14 / 23
» ANSWER: Network Monitoring Using Object-Oriented Rules
Sort
View
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
14 years 1 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
IS
2011
12 years 11 months ago
Detecting proximity events in sensor networks
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or the surveillance of enemy forces in military applications. In this paper we int...
Antonios Deligiannakis, Yannis Kotidis
CACM
2008
84views more  CACM 2008»
13 years 7 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
SIGMETRICS
2005
ACM
101views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
Fundamental bounds on the accuracy of network performance measurements
This paper considers the basic problem of “how accurate can we make Internet performance measurements”. The answer is somewhat counter-intuitive in that there are bounds on th...
Matthew Roughan
NIPS
1997
13 years 9 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen