Sciweavers

2907 search results - page 19 / 582
» Trust analysis with clustering
Sort
View
ATAL
2008
Springer
14 years 2 days ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ATAL
2008
Springer
14 years 2 days ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ADHOCNETS
2009
Springer
14 years 4 months ago
Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis
Node clustering and data aggregation are popular techniques to reduce energy consumption in large WSNs and a large body of literature has emerged describing various clustering prot...
Anna Förster, Alexander Förster, Amy L. ...
CLUSTER
2006
IEEE
14 years 1 months ago
HPC Cluster Readiness of Xen and User Mode Linux
This paper examines the suitability of different virtualization techniques in a high performance cluster environment. A survey of virtualization techniques is presented. Two repre...
Wesley Emeneker, Dan Stanzione
PRL
2006
207views more  PRL 2006»
13 years 10 months ago
On-line trajectory clustering for anomalous events detection
In this paper we propose a trajectory clustering algorithm suited for video surveillance systems. Trajectories are clustered on-line, as the data are collected, and clusters are o...
Claudio Piciarelli, Gian Luca Foresti