Sciweavers

114 search results - page 5 / 23
» Practical algorithms for subgroup detection in covert networ...
Sort
View
INFOCOM
2012
IEEE
11 years 10 months ago
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
—In this work we develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate th...
Hongyu Zhou, Hongyi Wu, Miao Jin
ALGORITHMICA
2008
115views more  ALGORITHMICA 2008»
13 years 8 months ago
Algorithm Engineering for Color-Coding with Applications to Signaling Pathway Detection
Color-coding is a technique to design fixed-parameter algorithms for several NP-complete subgraph isomorphism problems. Somewhat surprisingly, not much work has so far been spent ...
Falk Hüffner, Sebastian Wernicke, Thomas Zich...
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
14 years 2 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
WINET
2002
144views more  WINET 2002»
13 years 7 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
SIGCOMM
2004
ACM
14 years 1 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...