Sciweavers

2715 search results - page 216 / 543
» Network bucket testing
Sort
View
BSN
2006
IEEE
111views Sensor Networks» more  BSN 2006»
14 years 4 months ago
A Compact, Wireless, Wearable Sensor Network for Interactive Dance Ensembles
We describe the design of a compact, wireless sensor module meant to capture expressive gestures in real-time when worn at the hands and feet of a dancer. Each sensor node include...
Ryan Aylward, S. Daniel Lovell, Joseph A. Paradiso
INFOCOM
2006
IEEE
14 years 4 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
KBSE
2006
IEEE
14 years 4 months ago
Accurate Centralization for Applying Model Checking on Networked Applications
Software model checkers can be applied directly to single-process programs, which typically are multithreaded. Multi-process applications cannot be model checked directly. While m...
Cyrille Artho, Pierre-Loïc Garoche
SIGCOMM
2006
ACM
14 years 4 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
ACSAC
2005
IEEE
14 years 4 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop