Results 1 - 10
of
24
Singular Spectrum Analysis of Traffic Workload in a Large-Scale Wireless LAN ∗ ABSTRACT
"... Network traffic load in an IEEE802.11 infrastructure arises from the superposition of traffic accessed by wireless clients associated with access points (APs). An accurate characterization of these data can be beneficial in modelling network traffic and addressing a variety of problems including cov ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
coverage planning, resource reservation and network monitoring for anomaly detection. This study focuses on the statistical analysis of the traffic load measured in a campus-wide IEEE802.11 infrastructure at each AP. Using the Singular Spectrum Analysis approach, we found that the time-series of traffic
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks
"... Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor networks. To address issues of non-stationarity in environmental data streams, each sensor-processor learns statistical dist ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor networks. To address issues of non-stationarity in environmental data streams, each sensor-processor learns statistical
THE DETECTION OF 13 CO AND OTHER APPARENT ABUNDANCE ANOMALIES IN THE SECONDARY STARS OF LONG-PERIOD CATACLYSMIC VARIABLES
"... ABSTRACT We present moderate-resolution (R > 1800) infrared K-band spectra of 12 long-period (P orb > 6 hr) cataclysmic variables (CVs). We detect absorption lines from the photospheres of the secondary stars in every system, even though two of them were undergoing outbursts. We have attempte ..."
Abstract
- Add to MetaCart
-type dwarfs. There is, however, only one common abundance anomaly: extremely weak CO features. Only two of the 12 objects appeared to have normal levels of CO absorption. We interpret this as evidence of low carbon abundances. In addition, we detect 13 CO absorption in four of the 12 objects. Depleted levels
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Self Determining Detection of Distributed Denial of Service Attacks
"... Abstract Wireless sensor networks are mostly vulnerable to attacks. It's difficult to find /track attacker due to mobility. Indeed, the number of new attacks as well as their sophistication are continuously increasing. Diametrically opposite strategy has been studied in the last few years such ..."
Abstract
- Add to MetaCart
such as unsupervised anomaly detection (UAD). UAD uses data mining techniques to extract patterns and uncover similar structures "hidden" in unlabeled traffic or unknown nature (attack or normal operation traffic), without relying on Digital signatures or baseline traffic profiles. Based on the observation
A COMPARATIVE ANALYSIS OF DATA MINING TOOLS FOR PERFORMANCE MAPPING OF WLAN DATA IJCET © I A E M E
"... ABSTRACT Data Mining is the non-trivial process of identifying valid, potentially and understandable patterns in the form of knowledge discovery from the large volume of data. The main aim of this process is to discovering patterns and associations among preprocessed and transformed data. Data mini ..."
Abstract
- Add to MetaCart
, health care, surveillance, fraud detection, scientific discovery and now a day's extensive usage in networking. Data mining supports supervised and unsupervised type of machine learning process. This paper uses the unsupervised learning process of data mining. For that the paper uses the wireless
Subspace Communication
, 2014
"... We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed by ..."
Abstract
- Add to MetaCart
by a fixed assignment of spectrum resources by regulatory agencies. This has resulted into a blind alley, as current wireless spectrum has become an expensive and a scarce resource. However, recent measurements in dense areas paint a very different picture: there is an actual underutilization
ACTA UNIVERSITATIS UPSALIENSIS
"... Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after deploymen ..."
Abstract
- Add to MetaCart
Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after
copyright by
, 2009
"... Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many applicati ..."
Abstract
- Add to MetaCart
Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
Results 1 - 10
of
24