Sciweavers

1291 search results - page 174 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ICDCS
2007
IEEE
14 years 3 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
SAINT
2006
IEEE
14 years 2 months ago
Filtering Features for a Composite Event Definition Language
This research has enhanced a distributed, rule-based application integration environment with a composite event definition language (CEDL) and detection system. CEDL builds on exi...
Susan Darling Urban, Ingrid Biswas, Suzanne W. Die...
GLOBECOM
2009
IEEE
14 years 20 days ago
Experimental Validation of Periodic Codes for PON Monitoring
In this paper we investigate both experimentally and via simulation the monitoring of fiber link quality in a PON using optical coding technology. We use a new, simple and costeffe...
Mohammad M. Rad, Habib Fathallah, Sophie LaRochell...
INFOCOM
2012
IEEE
11 years 11 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
14 years 2 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...