Sciweavers

935 search results - page 50 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
RAID
2005
Springer
14 years 1 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
CN
2004
256views more  CN 2004»
13 years 7 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
ISCAS
2005
IEEE
132views Hardware» more  ISCAS 2005»
14 years 1 months ago
Parallelism/regularity-driven MIMO detection algorithm design
Efficient VLSI implementation of multiple-input multiple-output (MIMO) detectors plays an important role in the real-life implementation of MIMO communication systems. However, m...
Tong Zhang, Yan Xin, Sizhong Chen
IPPS
2007
IEEE
14 years 2 months ago
Experiments with a Software Component Enabling NetSolve with Direct Communications in a Non-Intrusive and Incremental Way
The paper presents a software component that enables NetSolve with direct communications between servers in a non-intrusive and incremental way. Non-intrusiveness means that the s...
Xin Zuo, Alexey L. Lastovetsky
IJCNN
2006
IEEE
14 years 1 months ago
Real-Time Implementation of an Optimal Transient Neurocontroller for a GCSC
—This paper presents the design of an optimal Auxiliary Transient Neurocontroller (ATNC) for the Gate Controlled Series Capacitor (GCSC) in a multi-machine power system. GCSC is ...
Swakshar Ray, Ganesh K. Venayagamoorthy