Sciweavers

134 search results - page 18 / 27
» Adaptive Activity Spotting Based on Event Rates
Sort
View
APNOMS
2006
Springer
13 years 11 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
ISPDC
2005
IEEE
14 years 1 months ago
Adaptive window scheduling for a hierarchical agent system
DIET (Distributed Interactive Engineering Toolbox) is a toolbox for the construction of Network Enabled Server (NES) systems. For most NES systems, as for most grid middleware sys...
Holly Dail, Frederic Desprez
PERCOM
2006
ACM
14 years 7 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
POLICY
2001
Springer
14 years 7 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
CRV
2005
IEEE
272views Robotics» more  CRV 2005»
13 years 9 months ago
Real-Time Video Surveillance with Self-Organizing Maps
In this paper, we present an approach for video surveillance involving (a) moving object detection, (b) tracking and (c) normal/abnormal event recognition. The detection step uses...
Mohamed Dahmane, Jean Meunier