Sciweavers

CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 10 months ago
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of...
Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos...
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 10 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 10 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 10 months ago
An Algebraic Approach for the MIMO Control of Small Scale Helicopter
The control of small-scale helicopter is a MIMO problem. To use of classical control approach to formally solve a MIMO problem, one needs to come up with multidimensional Root Loc...
Agus Budiyono, T. Sudiyanto
CORR
2008
Springer
74views Education» more  CORR 2008»
13 years 10 months ago
Understanding individual human mobility patterns
M. C. Gonzalez, Cesar A. Hidalgo R., Albert-L&aacu...
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 10 months ago
Bounds on Codes Based on Graph Theory
"THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD" Let Aq(n, d) be the maximum order (maximum number of codewords) of a q-ary code of length n and Hamming distance at l...
Salim Y. El Rouayheb, Costas N. Georghiades, Emina...
CORR
2008
Springer
172views Education» more  CORR 2008»
13 years 10 months ago
Altruism in Congestion Games
This paper studies the effects of introducing altruistic agents into atomic congestion games. Altruistic behavior is modeled by a trade-off between selfish and social objectives. ...
Martin Hoefer, Alexander Skopalik
CORR
2008
Springer
138views Education» more  CORR 2008»
13 years 10 months ago
The implicit equation of a canal surface
A canal surface is an envelope of a one parameter family of spheres. In this paper we present an efficient algorithm for computing the implicit equation of a canal surface generat...
Marc Dohm, Severinas Zube
CORR
2008
Springer
69views Education» more  CORR 2008»
13 years 10 months ago
Information In The Non-Stationary Case
Information estimates such as the "direct method" of Strong et al. (1998) sidestep the difficult problem of estimating the joint distribution of response and stimulus by...
Vincent Q. Vu, Bin Yu, Robert E. Kass
CORR
2008
Springer
113views Education» more  CORR 2008»
13 years 10 months ago
Power Indices and minimal winning Coalitions
The Penrose-Banzhaf index and the Shapley-Shubik index are the best-known and the most used tools to measure political power of voters in simple voting games. Most methods to calc...
Werner Kirsch, Jessica Langner