Sciweavers

63 search results - page 10 / 13
» Detecting Coordinated Distributed Multiple Attacks
Sort
View
IWIA
2005
IEEE
15 years 8 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
150
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
SigSag: Iterative detection through soft message-passing
—The multiple-access framework of ZigZag decoding [1] is a useful technique for combating interference via multiple repeated transmissions, and is known to be compatible with dis...
Arash Saber Tehrani, Alexandros G. Dimakis, Michae...
132
Voted
ICCS
2007
Springer
15 years 8 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
ICCV
2005
IEEE
15 years 8 months ago
Learning Hierarchical Models of Scenes, Objects, and Parts
We describe a hierarchical probabilistic model for the detection and recognition of objects in cluttered, natural scenes. The model is based on a set of parts which describe the e...
Erik B. Sudderth, Antonio B. Torralba, William T. ...
IROS
2006
IEEE
153views Robotics» more  IROS 2006»
15 years 8 months ago
RFID Technology-based Exploration and SLAM for Search And Rescue
— Robot search and rescue is a time critical task, i.e. a large terrain has to be explored by multiple robots within a short amount of time. The efficiency of exploration depend...
Alexander Kleiner, Johann Prediger, Bernhard Nebel