Sciweavers

895 search results - page 152 / 179
» Outlier detection in sensor networks
Sort
View
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 22 days ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 2 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
SOCC
2008
IEEE
117views Education» more  SOCC 2008»
14 years 2 months ago
In-situ self-aware adaptive power control system with multi-mode power gating network
An in-situ self-aware adaptive power control (APC) system is presented in this paper. This APC system consists of a voltage sensor, a variable threshold comparator, slack detectio...
Wei-Chih Hsieh, Wei Hwang
IJACTAICIT
2010
237views more  IJACTAICIT 2010»
13 years 5 months ago
Path Planning of Mobile Robot Based on Modification of Vector Field Histogram using Neuro-Fuzzy Algorithm
In this paper, a neuro-fuzzy algorithm has been implemented to improve the path planning of a mobile robot based on modification of vector field histogram (VFH) approach using neu...
Ali H. Hamad, Fatima B. Ibrahim