Sciweavers

1737 search results - page 22 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CORR
1999
Springer
70views Education» more  CORR 1999»
13 years 7 months ago
Restart Strategies and Internet Congestion
We recently presented a methodology to quantitatively reduce the average time and variance in the time required to execute electronic transactions in a network environment such as...
Sebastian M. Maurer, Bernardo A. Huberman
NN
2008
Springer
201views Neural Networks» more  NN 2008»
13 years 7 months ago
Learning representations for object classification using multi-stage optimal component analysis
Learning data representations is a fundamental challenge in modeling neural processes and plays an important role in applications such as object recognition. In multi-stage Optima...
Yiming Wu, Xiuwen Liu, Washington Mio
ICC
2007
IEEE
13 years 11 months ago
A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks
In this paper, a new strategy is proposed to defend against colluding malicious nodes in a sensor network. The new strategy is based on a new relaxation labeling algorithm to class...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
14 years 1 months ago
Lifetime Analysis in Heterogeneous Sensor Networks
Wireless sensor networks (WSN) are composed of battery-driven communication entities performing multiple, usually different tasks. In order to complete a given task, all sensor no...
Falko Dressler, Isabel Dietrich
ACSAC
2004
IEEE
13 years 11 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee