Sciweavers

1318 search results - page 204 / 264
» Measuring network security using dynamic bayesian network
Sort
View
PERCOM
2008
ACM
14 years 8 months ago
ReMo : An Energy Efficient Reprogramming Protocol for Mobile Sensor Networks
Existing code update protocols for reprogramming nodes in a sensor network are either unsuitable or inefficient when used in a mobile environment. The prohibitive factor of uncert...
Pradip De, Yonghe Liu, Sajal K. Das
CJ
2010
105views more  CJ 2010»
13 years 6 months ago
Efficient Semantic Information Exchange for Ambient Intelligence
This paper studies semantic efficiency measures for ambient intelligence. We follow an agent-based approach and investigate how large quantities of information can be efficiently ...
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M....
IMC
2004
ACM
14 years 2 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
NN
2008
Springer
158views Neural Networks» more  NN 2008»
13 years 9 months ago
Optimal wide-area monitoring and nonlinear adaptive coordinating neurocontrol of a power system with wind power integration and
Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area coordinating neurocont...
Wei Qiao, Ganesh K. Venayagamoorthy, Ronald G. Har...
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi