Sciweavers

91 search results - page 10 / 19
» Sources and Monitors: A Trust Model for Peer-to-Peer Network...
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 10 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable deļ¬nition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
CCECE
2006
IEEE
13 years 11 months ago
Modelling and Emulation of Multifractal Noise in Performance Evaluation of Mesh Networks
This paper describes a model and a setup for emulating fractal and multifractal noise for the measurement and evaluation of performance of ZigBee mesh networks intended for harsh ...
Lily Woo, Witold Kinsner, Ken Ferens, J. Diamond
CJ
2011
12 years 11 months ago
Dynamic Multipath Allocation in Ad Hoc Networks
Ad Hoc networks are characterized by fast dynamic changes in the topology of the network. A known technique to improve QoS is to use Multipath routing where packets (voice/video/ā...
Yosi Ben-Asher, Sharoni Feldman, Moran Feldman
CCR
2006
76views more  CCR 2006»
13 years 7 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
IJCNLP
2005
Springer
14 years 29 days ago
A Connectionist Model of Anticipation in Visual Worlds
Recent ā€œvisual worldsā€ studies, wherein researchers study language in context by monitoring eye-movements in a visual scene during sentence processing, have revealed much about...
Marshall R. Mayberry, Matthew W. Crocker, Pia Knoe...