Sciweavers

799 search results - page 66 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
13 years 10 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
WONS
2005
IEEE
14 years 1 months ago
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks
Due to the mobility of nodes in Ad hoc networks, network topology is dynamic and unpredictable, which leads to frequent network partitioning. This partitioning disconnects many no...
Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bo...
ADHOCNOW
2008
Springer
14 years 2 months ago
Geographic Routing with Early Obstacles Detection and Avoidance in Dense Wireless Sensor Networks
Existing geographic routing algorithms for sensor networks are mainly concerned with finding a path toward a destination, without explicitly addressing the impact of obstacles on ...
Luminita Moraru, Pierre Leone, Sotiris E. Nikolets...
VIZSEC
2005
Springer
14 years 1 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
DASFAA
1999
IEEE
118views Database» more  DASFAA 1999»
14 years 8 days ago
Materialized View Maintenance Using Version Numbers
A data warehouse stores materialized views over data from one or more sources in order to provide fast access to the integrated data, regardless of the availability of the data so...
Tok Wang Ling, Eng Koon Sze