Sciweavers

799 search results - page 144 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
DSN
2003
IEEE
14 years 1 months ago
N-Way Fail-Over Infrastructure for Reliable Servers and Routers
Maintaining the availability of critical servers and routers is an important concern for many organizations. At the lowest level, IP addresses represent the global namespace by wh...
Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schloss...
ICDCS
2010
IEEE
13 years 11 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
GLOBECOM
2006
IEEE
14 years 1 months ago
Analysis of the Effect of Mobile Terminal Speed on WLAN/3G Vertical Handovers
— WLAN hot-spots are becoming widely spread. This, combined with the availability of new multi-mode terminals integrating heterogeneous technologies, opens new business opportuni...
Telemaco Melia, Antonio de la Oliva, Ignacio Soto,...
CEAS
2008
Springer
13 years 9 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
IPSN
2010
Springer
14 years 2 months ago
On-line sensing task optimization for shared sensors
Shared sensing infrastructures that allow multiple applications to share deployed sensors are emerging and Internet protocol based access for such sensors has already been prototy...
Arsalan Tavakoli, Aman Kansal, Suman Nath