Sciweavers

1266 search results - page 177 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CORR
2008
Springer
156views Education» more  CORR 2008»
15 years 4 months ago
Wireless Sensor/Actuator Network Design for Mobile Control Applications
: Wireless sensor/actuator networks (WSANs) are emerging as a new generation of sensor networks. Serving as the backbone of control applications, WSANs will enable an unprecedented...
Feng Xia, Yu-Chu Tian, Yanjun Li, Youxian Sun
DATAMINE
1999
113views more  DATAMINE 1999»
15 years 3 months ago
A Fast Parallel Clustering Algorithm for Large Spatial Databases
The clustering algorithm DBSCAN relies on a density-based notion of clusters and is designed to discover clusters of arbitrary shape as well as to distinguish noise. In this paper,...
Xiaowei Xu, Jochen Jäger, Hans-Peter Kriegel
TMA
2010
Springer
150views Management» more  TMA 2010»
15 years 1 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
NIPS
1996
15 years 5 months ago
Why did TD-Gammon Work?
Although TD-Gammon is one of the major successes in machine learning, it has not led to similar impressive breakthroughs in temporal difference learning for other applications or ...
Jordan B. Pollack, Alan D. Blair
VTC
2008
IEEE
137views Communications» more  VTC 2008»
15 years 10 months ago
A Multi-Hop Polling Service with Bandwidth Request Aggregation in IEEE 802.16j Networks
— The IEEE 802.16j protocol for a multi-hop relay (MMR) WiMAX network is being developed to increase data rates and extend service coverage as an enhancement of existing WiMAX st...
Chun Nie, Thanasis Korakis, Shivendra S. Panwar