Sciweavers

1051 search results - page 54 / 211
» group 2009
Sort
View
PERCOM
2009
ACM
14 years 4 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
14 years 4 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
WETICE
2009
IEEE
14 years 4 months ago
Secure Peer Sampling Service: The Mosquito Attack
Peer sampling – the capability of obtaining a random sample from a large population of peers – is a basic building block for the gossip paradigm. Current peer sampling service...
Gian Paolo Jesi, Alberto Montresor
DAGM
2009
Springer
14 years 4 months ago
Pedestrian Detection by Probabilistic Component Assembly
We present a novel pedestrian detection system based on probabilistic component assembly. A part-based model is proposed which uses three parts consisting of head-shoulder, torso a...
Martin Rapus, Stefan Munder, Gregory Baratoff, Joa...
ICIDS
2009
Springer
14 years 4 months ago
Narrative Development in Improvisational Theatre
We have investigated the experience of improvisers as they perform to better understand how narrative is constructed by group performance in improvisational theatre. Our study was ...
Allan Baumer, Brian Magerko