Sciweavers

3780 search results - page 601 / 756
» Algorithms for Game Metrics
Sort
View
146
Voted
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
15 years 9 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
119
Voted
FCT
2005
Springer
15 years 9 months ago
Fully Incremental LCS Computation
Sequence comparison is a fundamental task in pattern matching. Its applications include file comparison, spelling correction, information retrieval, and computing (dis)similaritie...
Yusuke Ishida, Shunsuke Inenaga, Ayumi Shinohara, ...
GECCO
2005
Springer
146views Optimization» more  GECCO 2005»
15 years 9 months ago
An empirical study of the robustness of two module clustering fitness functions
Two of the attractions of search-based software engineering (SBSE) derive from the nature of the fitness functions used to guide the search. These have proved to be highly robust...
Mark Harman, Stephen Swift, Kiarash Mahdavi
108
Voted
ICCSA
2005
Springer
15 years 9 months ago
A Novel Hierarchical Routing Protocol for Wireless Sensor Networks
Abstract. In this paper, we propose a novel hierarchical routing protocol for a large wireless sensor network (WSN) wherein sensors are arranged into a multi-layer architecture wit...
Trong Thua Huynh, Choong Seon Hong
113
Voted
ISPEC
2005
Springer
15 years 9 months ago
Robust Routing in Malicious Environment for Ad Hoc Networks
Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...