Sciweavers

2990 search results - page 123 / 598
» Thresholding for Change Detection
Sort
View
GLOBECOM
2009
IEEE
14 years 3 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
BMCBI
2005
92views more  BMCBI 2005»
13 years 8 months ago
Predicting functional sites with an automated algorithm suitable for heterogeneous datasets
Background: In a previous report (La et al., Proteins, 2005), we have demonstrated that the identification of phylogenetic motifs, protein sequence fragments conserving the overal...
David La, Dennis R. Livesay
CAISE
2006
Springer
14 years 19 days ago
A Matchmaking-based Ontology Evolution Methodology
In this paper, we present the H-Change methodology we have specifically conceived for evolving independent ontologies in open networked systems. Furthermore, we describe the change...
Silvana Castano, Alfio Ferrara, Stefano Montanelli
ICC
2007
IEEE
14 years 3 months ago
Diversity Coherent Receivers for Optical Communication over the Clear Turbulent Atmosphere
—Optical communication through the atmosphere possibly enables high data rate communication. However, the optical field undergoes fades or outages due to air turbulence. Spatial ...
Etty J. Lee, Vincent W. S. Chan
INFOCOM
2002
IEEE
14 years 1 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin