Sciweavers

2990 search results - page 123 / 598
» Thresholding for Change Detection
Sort
View
GLOBECOM
2009
IEEE
15 years 10 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
115
Voted
BMCBI
2005
92views more  BMCBI 2005»
15 years 3 months ago
Predicting functional sites with an automated algorithm suitable for heterogeneous datasets
Background: In a previous report (La et al., Proteins, 2005), we have demonstrated that the identification of phylogenetic motifs, protein sequence fragments conserving the overal...
David La, Dennis R. Livesay
86
Voted
CAISE
2006
Springer
15 years 7 months ago
A Matchmaking-based Ontology Evolution Methodology
In this paper, we present the H-Change methodology we have specifically conceived for evolving independent ontologies in open networked systems. Furthermore, we describe the change...
Silvana Castano, Alfio Ferrara, Stefano Montanelli
113
Voted
ICC
2007
IEEE
15 years 10 months ago
Diversity Coherent Receivers for Optical Communication over the Clear Turbulent Atmosphere
—Optical communication through the atmosphere possibly enables high data rate communication. However, the optical field undergoes fades or outages due to air turbulence. Spatial ...
Etty J. Lee, Vincent W. S. Chan
INFOCOM
2002
IEEE
15 years 8 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin