Sciweavers

309 search results - page 36 / 62
» Network Performance Anomaly Detection and Localization
Sort
View
145
Voted
ATAL
2011
Springer
14 years 2 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...
WEBI
2009
Springer
15 years 9 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
CORR
2007
Springer
148views Education» more  CORR 2007»
15 years 2 months ago
Optimal Power Allocation for Distributed Detection over MIMO Channels in Wireless Sensor Networks
—In distributed detection systems with wireless sensor networks, the communication between sensors and a fusion center is not perfect due to interference and limited transmitter ...
Xin Zhang, H. Vincent Poor, Mung Chiang
IWANN
2001
Springer
15 years 7 months ago
A Realistic Computational Model of the Local Circuitry of the Cuneate Nucleus
Abstract. Intracellular recordings obtained under cutaneous and lemniscal stimulation show that the afferent fibers can establish excitatory and inhibitory synaptic connections w...
Eduardo Sánchez Vila, Senén Barro, J...
139
Voted
ACSAC
2007
IEEE
15 years 6 months ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...