Sciweavers

1493 search results - page 33 / 299
» Self-Organization in Overlay Networks
Sort
View
SASO
2007
IEEE
14 years 1 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
IPSN
2007
Springer
14 years 1 months ago
Wireless localization using self-organizing maps
Localization is an essential service for many wireless sensor network applications. While several localization schemes rely on anchor nodes and range measurements to achieve fine...
Gianni Giorgetti, Sandeep K. S. Gupta, Gianfranco ...
IWIA
2006
IEEE
14 years 1 months ago
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organi...
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, ...
NN
2006
Springer
13 years 7 months ago
Missing data imputation through GTM as a mixture of t-distributions
The Generative Topographic Mapping (GTM) was originally conceived as a probabilistic alternative to the well-known, neural networkinspired, Self-Organizing Maps. The GTM can also ...
Alfredo Vellido
AUTONOMICS
2008
ACM
13 years 9 months ago
On modeling of self-organizing systems
A goal of computing and networking systems is to limit administrative requirements for users and operators. A technical systems should be able to configure itself as much as possi...
Richard Holzer, Hermann de Meer