Sciweavers

1318 search results - page 80 / 264
» Measuring network security using dynamic bayesian network
Sort
View
136
Voted
ICASSP
2010
IEEE
15 years 2 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
IMC
2005
ACM
15 years 8 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
GLOBECOM
2006
IEEE
15 years 8 months ago
Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
— In order to fully exploit the aggregate bandwidth available in the radio spectrum, future Wireless Mesh Networks (WMN) are expected to take advantage of multiple orthogonal cha...
Anjum Naveed, Salil S. Kanhere
124
Voted
CONEXT
2008
ACM
15 years 4 months ago
MOSAIC: unified declarative platform for dynamic overlay composition
Overlay networks create new networking services across nodes that communicate using pre-existing networks. MOSAIC is a unified declarative platform for constructing new overlay ne...
Yun Mao, Boon Thau Loo, Zachary G. Ives, Jonathan ...
HUC
2007
Springer
15 years 8 months ago
A Statistical Reasoning System for Medication Prompting
We describe our experience building and using a reasoning system for providing context-based prompts to elders to take their medication. We describe the process of specification, ...
Sengul Vurgun, Matthai Philipose, Misha Pavel