Sciweavers

1414 search results - page 19 / 283
» Combining Intruder Theories
Sort
View
ICONIP
2009
13 years 7 months ago
Probabilistic Combination of Multiple Evidence
In pattern recognition systems, data fusion is an important issue and evidence theory is one such method that has been successful. Many researchers have proposed different rules fo...
Heeyoul Choi, Anup Katake, Seungjin Choi, Yoonseop...
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 10 months ago
Conflict Free Rule for Combining Evidences
: Recent works have investigated the problem of the conflict redistribution in the fusion rules of evidence theories. As a consequence of these works, many new rules have been prop...
Frédéric Dambreville
SASO
2008
IEEE
14 years 4 months ago
Self-Organizing Sleep-Wake Sensor Systems
We propose a self-organizing sleep-wake sensor system that is scalable, easily implemented, and energy conserving. An application of concepts from cellular automata theory account...
Kyung Joon Kwak, Yuliy M. Baryshnikov, Edward G. C...
ESM
1998
13 years 11 months ago
On Hybrid Combination of Queueing and Simulation
This paper aims to and illustrate that simulation and queuing theory can and should go hand in hand for a variety of practical problems, both in daily-life and industry, which are...
Nico M. van Dijk
WIMOB
2008
IEEE
14 years 4 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...