Sciweavers

955 search results - page 56 / 191
» An Evaluation of Current High-Performance Networks
Sort
View
ACSC
2005
IEEE
15 years 10 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
EUROSYS
2006
ACM
15 years 8 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
MOBICOM
2006
ACM
15 years 10 months ago
WHYNET: a hybrid testbed for large-scale, heterogeneous and adaptive wireless networks
We present an overview of the WHYNET (Wireless HYbrid NETwork) testbed, currently being developed for realistic and scalable evaluation of next-generation wireless network protoco...
Junlan Zhou, Zhengrong Ji, Maneesh Varshney, Zhigu...
SECON
2008
IEEE
15 years 10 months ago
Adaptive Radio Modes in Sensor Networks: How Deep to Sleep?
—Energy-efficient performance is a central challenge in sensor network deployments, and the radio is a major contributor to overall energy node consumption. Current energyeffic...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
TMC
2010
159views more  TMC 2010»
15 years 2 months ago
Radio Sleep Mode Optimization in Wireless Sensor Networks
—Energy-efficiency is a central challenge in sensor networks, and the radio is a major contributor to overall energy node consumption. Current energy-efficient MAC protocols fo...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...