Sciweavers

394 search results - page 70 / 79
» Efficient and Robust Secure Aggregation for Sensor Networks
Sort
View
ACSAC
2003
IEEE
13 years 11 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
SENSYS
2010
ACM
13 years 5 months ago
eShare: a capacitor-driven energy storage and sharing network for long-term operation
The ability to move energy around makes it feasible to build distributed energy storage systems that can robustly extend the lifetime of networked sensor systems. eShare supports ...
Ting Zhu, Yu Gu, Tian He, Zhi-Li Zhang
ICMCS
2000
IEEE
116views Multimedia» more  ICMCS 2000»
14 years 2 hour ago
Non Linear Traffic Modeling of VBR MPEG-2 Video Sources
In this paper, a neural network scheme is presented for modeling VBR MPEG-2 video sources. In particular, three non linear autoregressive models (NAR) are proposed to model the ag...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Stef...
RAID
2010
Springer
13 years 6 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
ICC
1997
IEEE
110views Communications» more  ICC 1997»
13 years 11 months ago
Optimizing Resource Utilization in Wireless Multimedia Networks
The task of supporting integrated multi-rate multimedia traffic in a bandwidth poor wireless environment poses a unique and challenging problem for network managers. In this paper...
Paramvir Bahl, Imrich Chlamtac, András Fara...