Sciweavers

799 search results - page 58 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
APNOMS
2006
Springer
13 years 11 months ago
Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks
Setting up an IDS architecture on ad-hoc network is hard because it is not easy to find suitable locations to setup IDS's. One way is to divide the network into a set of clust...
Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim
AINA
2008
IEEE
14 years 2 months ago
Momentum-Based Motion Detection Methodology for Handoff in Wireless Networks
This paper presents a novel motion detection scheme by using the Momentum of Received Signal Strength (MRSS) to improve the quality of handoff in a general wireless network. MRSS ...
Tein-Yaw Chung, Chih-Hung Hsu, Yung-Mu Chen, K. Ro...
ICML
2001
IEEE
14 years 8 months ago
Bayesian approaches to failure prediction for disk drives
Hard disk drive failures are rare but are often costly. The ability to predict failures is important to consumers, drive manufacturers, and computer system manufacturers alike. In...
Greg Hamerly, Charles Elkan
CCGRID
2009
IEEE
14 years 2 months ago
Multi-scale Real-Time Grid Monitoring with Job Stream Mining
—The ever increasing scale and complexity of large computational systems ask for sophisticated management tools, paving the way toward Autonomic Computing. A first step toward A...
Xiangliang Zhang, Michèle Sebag, Céc...
ICCVG
2010
13 years 6 months ago
A New Method for ECG Signal Feature Extraction
Abstract. The paper concentrates on electrocardiographic (ECG) signal analysis for the sake of acquiring proper heartbeat datasets for further detection and recognition of anomalie...
Adam Szczepanski, Khalid Saeed, Alois Ferscha