Sciweavers

161 search results - page 25 / 33
» Algorithms for Sensor Networks: What Is It Good for
Sort
View
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
16 years 6 months ago
Monitoring Network Evolution using MDL
Given publication titles and authors, what can we say about the evolution of scientific topics and communities over time? Which communities shrunk, which emerged, and which split, ...
Jure Ferlez, Christos Faloutsos, Jure Leskovec, Du...
WIOPT
2011
IEEE
14 years 9 months ago
LIFO-Backpressure achieves near optimal utility-delay tradeoff
There has been considerable recent work developing a new stochastic network utility maximization framework using Backpressure algorithms, also known as MaxWeight. A key open probl...
Longbo Huang, Scott Moeller, Michael J. Neely, Bha...
149
Voted
ICDCSW
2005
IEEE
15 years 11 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
155
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
140
Voted
SENSYS
2009
ACM
16 years 1 days ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...