Sciweavers

799 search results - page 100 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
IJCNN
2008
IEEE
14 years 2 months ago
Active Meta-Learning with Uncertainty Sampling and Outlier Detection
Abstract— Meta-Learning has been used to predict the performance of learning algorithms based on descriptive features of the learning problems. Each training example in this cont...
Ricardo Bastos Cavalcante Prudêncio, Teresa ...
TISSEC
2008
202views more  TISSEC 2008»
13 years 7 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 2 months ago
Distributed Link Scheduling for TDMA Mesh Networks
— We present a distributed scheduling algorithm for provisioning of guaranteed link bandwidths in ad hoc mesh networks. The guaranteed link bandwidths are necessary to provide de...
Petar Djukic, Shahrokh Valaee
CORR
2011
Springer
182views Education» more  CORR 2011»
13 years 2 months ago
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and adv...
Fabio Pasqualetti, Florian Dörfler, Francesco...
PODC
2005
ACM
14 years 1 months ago
Stochastic analysis of distributed deadlock scheduling
Deadlock detection scheduling is an important, yet oft-overlooked problem that can significantly affect the overall performance of deadlock handling. An excessive initiation of ...
Shigang Chen, Yibei Ling