Sciweavers

433 search results - page 69 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
ATAL
2009
Springer
14 years 3 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
DCOSS
2006
Springer
14 years 12 days ago
Distance-Sensitive Information Brokerage in Sensor Networks
In a sensor network information from multiple nodes must usually be aggregated in order to accomplish a certain task. A natural way to view this information gathering is in terms o...
Stefan Funke, Leonidas J. Guibas, An Nguyen, Yusu ...
MSWIM
2006
ACM
14 years 2 months ago
Analysis of soft handover measurements in 3G network
A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
Kimmo Raivio
INTERACT
2003
13 years 10 months ago
MyTeam: Availability Awareness Through the Use of Sensor Data
: This paper reports on a four-week study of the usage of myTeam, a prototype that provides availability awareness for distributed work groups through the use of sensor data. Autom...
Jennifer Lai, Sachiko Yoshihama, Thomas Bridgman, ...
DKE
2008
108views more  DKE 2008»
13 years 8 months ago
The thematic and citation landscape of Data and Knowledge Engineering
The thematic and citation structures of Data and Knowledge Engineering (DKE) (1985-2007) are identified based on text analysis and citation analysis of the bibliographic records o...
Chaomei Chen, Il-Yeol Song, Xiaojun Yuan, Jian Zha...