Sciweavers

213 search results - page 29 / 43
» Validating module network learning algorithms using simulate...
Sort
View
WINET
2008
200views more  WINET 2008»
13 years 7 months ago
Performance evaluation of an IEEE 802.15.4 sensor network with a star topology
One class of applications envisaged for the IEEE 802.15.4 LR-WPAN (low data rate - wireless personal area network) standard is wireless sensor networks for monitoring and control a...
Chandramani Kishore Singh, Anurag Kumar, P. M. Ame...
AAAI
2000
13 years 9 months ago
Interactive Training for Synthetic Characters
Compelling synthetic characters must behave in ways that reflect their past experience and thus allow for individual personalization. We therefore need a method that allows charac...
Song-Yee Yoon, Robert C. Burke, Bruce Blumberg, Ge...
WWW
2009
ACM
14 years 2 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
IPCCC
2007
IEEE
14 years 2 months ago
Composite Event Detection in Wireless Sensor Networks
Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming c...
Chinh T. Vu, Raheem A. Beyah, Yingshu Li
IDEAL
2003
Springer
14 years 28 days ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...