Sciweavers

215 search results - page 35 / 43
» Training Data Compression Algorithms and Reliability in Larg...
Sort
View
160
Voted
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 9 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
158
Voted
WSNA
2003
ACM
15 years 8 months ago
Asymptotically optimal time synchronization in dense sensor networks
We consider the problem of synchronization of all clocks in a sensor network, in the regime of asymptotically high node densities. We formulate this problem as one in which all cl...
An-Swol Hu, Sergio D. Servetto
113
Voted
IWCMC
2006
ACM
15 years 8 months ago
Performance enhancing proxy for interactive 3G network gaming
Unlike non-time-critical applications like email and file transfer, network games demand timely data delivery to maintain the seemingly interactive presence of players in the vir...
Gene Cheung, Takashi Sakamoto, Michael Sweeney
135
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Basis Pursuit in sensor networks
Basis Pursuit (BP) finds a minimum ℓ1-norm vector z that satisfies the underdetermined linear system Mz = b, where the matrix M and vector b are given. Lately, BP has attracte...
João F. C. Mota, João M. F. Xavier, ...
122
Voted
PERCOM
2007
ACM
16 years 2 months ago
Exploring Non Uniform Quality of Service for Extending WSN Lifetime
Interest in extracting and exploiting information from wireless sensor networks has been increasing for several years. Most scenarios focus on collecting and evaluating large amoun...
Anna Egorova-Forster, Amy L. Murphy