Sciweavers

18209 search results - page 3591 / 3642
» Some Remarks on the Paper
Sort
View
TJS
2010
182views more  TJS 2010»
13 years 7 months ago
A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning
This paper presents a novel host-based combinatorial method based on k-Means clustering and ID3 decision tree learning algorithms for unsupervised classification of anomalous and ...
Yasser Yasami, Saadat Pour Mozaffari
TKDE
2010
182views more  TKDE 2010»
13 years 7 months ago
MILD: Multiple-Instance Learning via Disambiguation
In multiple-instance learning (MIL), an individual example is called an instance and a bag contains a single or multiple instances. The class labels available in the training set ...
Wu-Jun Li, Dit-Yan Yeung
TMC
2010
85views more  TMC 2010»
13 years 7 months ago
Juggler: Virtual Networks for Fun and Profit
—There are many situations in which an additional network interface—or two—can provide benefits to a mobile user. Additional interfaces can support parallelism in network flo...
Anthony J. Nicholson, Scott Wolchok, Brian D. Nobl...
TMC
2010
158views more  TMC 2010»
13 years 7 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
TMC
2010
161views more  TMC 2010»
13 years 7 months ago
Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks
—Many recent advances in MAC protocols for wireless sensor networks have been proposed to reduce idle listening, an energy wasteful state of the radio. Low-Power-Listening (LPL) ...
Christophe J. Merlin, Wendi B. Heinzelman
« Prev « First page 3591 / 3642 Last » Next »