Sciweavers

63 search results - page 10 / 13
» Detecting Coordinated Distributed Multiple Attacks
Sort
View
IWIA
2005
IEEE
14 years 1 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
INFOCOM
2011
IEEE
12 years 11 months ago
SigSag: Iterative detection through soft message-passing
—The multiple-access framework of ZigZag decoding [1] is a useful technique for combating interference via multiple repeated transmissions, and is known to be compatible with dis...
Arash Saber Tehrani, Alexandros G. Dimakis, Michae...
ICCS
2007
Springer
14 years 1 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
ICCV
2005
IEEE
14 years 1 months ago
Learning Hierarchical Models of Scenes, Objects, and Parts
We describe a hierarchical probabilistic model for the detection and recognition of objects in cluttered, natural scenes. The model is based on a set of parts which describe the e...
Erik B. Sudderth, Antonio B. Torralba, William T. ...
IROS
2006
IEEE
153views Robotics» more  IROS 2006»
14 years 1 months ago
RFID Technology-based Exploration and SLAM for Search And Rescue
— Robot search and rescue is a time critical task, i.e. a large terrain has to be explored by multiple robots within a short amount of time. The efficiency of exploration depend...
Alexander Kleiner, Johann Prediger, Bernhard Nebel