Sciweavers

1771 search results - page 292 / 355
» Bayesian Network Based XP Process Modelling
Sort
View
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
GIS
2004
ACM
14 years 10 months ago
Supporting spatial aggregation in sensor network databases
Sensor networks are unattended deeply distributed systems whose schema can be conceptualized using the relational model. Aggregation queries on the data sampled at each ode are th...
Mehdi Sharifzadeh, Cyrus Shahabi
CCS
2010
ACM
14 years 3 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...
MOBIQUITOUS
2008
IEEE
14 years 3 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
NPL
2000
146views more  NPL 2000»
13 years 8 months ago
Competitive and Temporal Inhibition Structures with Spiking Neurons
The paper describes the implementation of competitive neural structures based on a spiking neural model that includes multiplicative or shunting synapses enabling non-saturated sta...
Eduardo Ros Vidal, Francisco J. Pelayo, P. Martin-...