Sciweavers

917 search results - page 160 / 184
» The Generalized Trace-Norm and its Application to Structure-...
Sort
View
SASN
2006
ACM
14 years 1 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
SCOPES
2005
Springer
14 years 1 months ago
Language Support for Interoperable Messaging in Sensor Networks
Development of network communication in a homogeneous sensor network environment is straightforward as the nodes can share message layouts simply by letting the compiler lay out m...
Kevin Chang, David Gay
CCS
2004
ACM
14 years 1 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
SIGUCCS
2009
ACM
14 years 18 days ago
Automated lecture recording system with AVCHD camcorder and microserver
Although recording and streaming lecture videos is becoming popular, large-scale lecture recording is still a difficult task for many universities. Auto lecture recording systems ...
Takayuki Nagai
EKAW
2000
Springer
13 years 11 months ago
Torture Tests: A Quantitative Analysis for the Robustness of Knowledge-Based Systems
Abstract. The overall aim of this paper is to provide a general setting for quantitative quality measures of Knowledge-Based System behavior which is widely applicable to many Know...
Perry Groot, Frank van Harmelen, Annette ten Teije