Sciweavers

1661 search results - page 134 / 333
» Distributed Top-K Monitoring
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Tracking Quantiles of Network Data Streams with Dynamic Operations
— Quantiles are very useful in characterizing the data distribution of an evolving dataset in the process of data mining or network monitoring. The method of Stochastic Approxima...
Jin Cao, Li (Erran) Li, Aiyou Chen, Tian Bu
ICDE
2012
IEEE
216views Database» more  ICDE 2012»
12 years 24 days ago
Load Balancing in MapReduce Based on Scalable Cardinality Estimates
—MapReduce has emerged as a popular tool for distributed and scalable processing of massive data sets and is increasingly being used in e-science applications. Unfortunately, the...
Benjamin Gufler, Nikolaus Augsten, Angelika Reiser...
IPPS
2006
IEEE
14 years 4 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
PDCAT
2004
Springer
14 years 3 months ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
DCOSS
2007
Springer
14 years 2 months ago
Energy Efficient Intrusion Detection in Camera Sensor Networks
The problem we address in this paper is how to detect an intruder moving through a polygonal space that is equipped with a camera sensor network. We propose a probabilistic sensor ...
Primoz Skraba, Leonidas J. Guibas