Sciweavers

799 search results - page 84 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 1 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
ICIRA
2010
Springer
124views Robotics» more  ICIRA 2010»
13 years 6 months ago
Evaluating the Fuzzy Coverage Model for 3D Multi-camera Network Applications
An intuitive three-dimensional task-oriented coverage model for 3D multi-camera networks based on fuzzy sets is presented. The model captures the vagueness inherent in the concept ...
Aaron Mavrinac, Jose Luis Alarcon Herrera, Xiang C...
TSP
2008
167views more  TSP 2008»
13 years 7 months ago
Decentralized Adaptive Filtering Algorithms for Sensor Activation in an Unattended Ground Sensor Network
Abstract--We present decentralized adaptive filtering algorithms for sensor activation control in an unattended ground sensor network (UGSN) comprised of ZigBee-enabled nodes. Node...
Vikram Krishnamurthy, Michael Maskery, Gang George...
ICANN
1997
Springer
14 years 1 days ago
Corner Detection in Color Images by Multiscale Combination of End-Stopped Cortical Cells
We present a corner-detection algorithm based on a model for end-stopping cells in the visual cortex. Shortcomings of this model are overcome by a combination over several scales. ...
Rolf P. Würtz, Tino Lourens
EPEW
2005
Springer
14 years 1 months ago
Performance Tuning of Failure Detectors in Wireless Ad-hoc Networks: Modelling and Experiments
Abstract. We consider wireless ad-hoc networks and implement failure detections mechanisms. These failure detectors provide elementary information for high level distributed algori...
Corine Marchand, Jean-Marc Vincent