Sciweavers

659 search results - page 123 / 132
» Anomaly intrusion detection in wireless sensor networks
Sort
View
JCST
2010
119views more  JCST 2010»
13 years 5 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 2 months ago
A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks
This paper offers a local distributed algorithm for expectation maximization in large peer-to-peer environments. The algorithm can be used for a variety of well-known data mining...
Kanishka Bhaduri, Ashok N. Srivastava
INFOCOM
2009
IEEE
14 years 2 months ago
Measuring Complexity and Predictability in Networks with Multiscale Entropy Analysis
—We propose to use multiscale entropy analysis in characterisation of network traffic and spectrum usage. We show that with such analysis one can quantify complexity and predict...
Janne Riihijärvi, Matthias Wellens, Petri M&a...
IPSN
2011
Springer
12 years 10 months ago
Duty-cycling buildings aggressively: The next frontier in HVAC control
Buildings are known to be the largest consumers of electricity in the United States, and often times the dominant energy consumer is the HVAC system. Despite this fact, in most bu...
Yuvraj Agarwal, Bharathan Balaji, Seemanta Dutta, ...
MOBIDE
2010
ACM
13 years 7 months ago
Power-aware operator placement and broadcasting of continuous query results
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...