Sciweavers

562 search results - page 91 / 113
» How to Optimize Residual Communications
Sort
View
ALT
2008
Springer
14 years 5 months ago
Visual Analytics: Combining Automated Discovery with Interactive Visualizations
In numerous application areas fast growing data sets develop with ever higher complexity and dynamics. A central challenge is to filter the substantial information and to communic...
Daniel A. Keim, Florian Mansmann, Daniela Oelke, H...
ICAC
2009
IEEE
14 years 3 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...
GLOBECOM
2008
IEEE
14 years 2 months ago
Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks
—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetim...
Maggie X. Cheng, Xuan Gong, Lin Cai
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 2 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
EUC
2007
Springer
14 years 2 months ago
Scriptable Sensor Network Based Home-Automation
Today, proprietary home automation targets very specific applications which operate mostly on a cable based infrastructure. In contrast to that, our implementation builds a wirele...
Thomas Haenselmann, Thomas King, Marcel Busse, Wol...