Sciweavers

765 search results - page 135 / 153
» Detecting Anomalies and Intruders
Sort
View
PEWASUN
2008
ACM
13 years 8 months ago
Source traffic modeling in wireless sensor networks for target tracking
Researches around wireless sensor network (WSN) were very prolific recently. However, traffic modeling related WSN research was poorly less. In this paper, source traffic dynamics...
Qinghua Wang, Tingting Zhang
NIPS
2007
13 years 8 months ago
Measuring Neural Synchrony by Message Passing
A novel approach to measure the interdependence of two time series is proposed, referred to as “stochastic event synchrony” (SES); it quantifies the alignment of two point pr...
Justin Dauwels, François B. Vialatte, Tomas...
JUCS
2006
146views more  JUCS 2006»
13 years 7 months ago
Health Monitoring and Assistance to Support Aging in Place
: To many people, home is a sanctuary. For those people who need special medical care, they may need to be pulled out of their home to meet their medical needs. As the population a...
Diane J. Cook
ICPP
2007
IEEE
14 years 1 months ago
Multi-Layer Event Trace Analysis for Parallel I/O Performance Tuning
The complexity of parallel I/O systems lies in the deep I/O stack with many software layers and concurrent I/O request handling at multiple layers. This paper explores multi-layer...
Pin Lu, Kai Shen
WS
2004
ACM
14 years 24 days ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala