Sciweavers

943 search results - page 135 / 189
» Analysis of Enhanced Deployment Models for Sensor Networks
Sort
View
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
14 years 2 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 8 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
COMGEO
2010
ACM
13 years 5 months ago
A new paradigm for integrated environmental monitoring
The vision of an integrated Earth observation system to help protect and sustain the planet and its inhabitants is significant and timely, and thus has been identified recently by...
Kevin Montgomery, Carsten W. Mundt
CCGRID
2005
IEEE
14 years 1 months ago
Data grid performance analysis through study of replication and storage infrastructure parameters
Running Data Grid applications such as High Energy Nuclear Physics (HENP) and weather modelling experiments involves working with huge data sets possibly of hundreds of Terabytes ...
Ernest Sithole, Gerard P. Parr, Sally I. McClean
CODES
2008
IEEE
14 years 2 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...