Sciweavers

394 search results - page 52 / 79
» Game theoretic models for detecting network intrusions
Sort
View
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
14 years 1 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
14 years 1 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
EPEW
2005
Springer
14 years 1 months ago
Performance Tuning of Failure Detectors in Wireless Ad-hoc Networks: Modelling and Experiments
Abstract. We consider wireless ad-hoc networks and implement failure detections mechanisms. These failure detectors provide elementary information for high level distributed algori...
Corine Marchand, Jean-Marc Vincent
ECAI
2010
Springer
13 years 7 months ago
Mining Outliers with Adaptive Cutoff Update and Space Utilization (RACAS)
Recently the efficiency of an outlier detection algorithm ORCA was improved by RCS (Randomization with faster Cutoff update and Space utilization after pruning), which changes the ...
Chi-Cheong Szeto, Edward Hung
HUC
2009
Springer
14 years 7 days ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...