Sciweavers

1266 search results - page 220 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IDA
2002
Springer
13 years 8 months ago
Online classification of nonstationary data streams
Most classification methods are based on the assumption that the data conforms to a stationary distribution. However, the real-world data is usually collected over certain periods...
Mark Last
INFOCOM
2007
IEEE
14 years 2 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
14 years 1 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
INFOCOM
2005
IEEE
14 years 2 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning
IFSA
2003
Springer
101views Fuzzy Logic» more  IFSA 2003»
14 years 1 months ago
Commutativity as Prior Knowledge in Fuzzy Modeling
In fuzzy modeling (FM), the quantity and quality of the training set is crucial to properly grasp the behavior of the system being modeled. However, the available data are often n...
Pablo Carmona, Juan Luis Castro, Jose Manuel Zurit...