• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 24
Next 10 →

Singular Spectrum Analysis of Traffic Workload in a Large-Scale Wireless LAN ∗ ABSTRACT

by George Tzagkarakis, Maria Papadopouli, Panagiotis Tsakalides
"... Network traffic load in an IEEE802.11 infrastructure arises from the superposition of traffic accessed by wireless clients associated with access points (APs). An accurate characterization of these data can be beneficial in modelling network traffic and addressing a variety of problems including cov ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
coverage planning, resource reservation and network monitoring for anomaly detection. This study focuses on the statistical analysis of the traffic load measured in a campus-wide IEEE802.11 infrastructure at each AP. Using the Singular Spectrum Analysis approach, we found that the time-series of traffic

Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks

by Luís M. A. Bettencourt, Arica. Hagberg, Levi B. Larkey
"... Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor networks. To address issues of non-stationarity in environmental data streams, each sensor-processor learns statistical dist ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor networks. To address issues of non-stationarity in environmental data streams, each sensor-processor learns statistical

THE DETECTION OF 13 CO AND OTHER APPARENT ABUNDANCE ANOMALIES IN THE SECONDARY STARS OF LONG-PERIOD CATACLYSMIC VARIABLES

by Thomas E Harrison , Heather L Osborne , Steve B Howell
"... ABSTRACT We present moderate-resolution (R > 1800) infrared K-band spectra of 12 long-period (P orb > 6 hr) cataclysmic variables (CVs). We detect absorption lines from the photospheres of the secondary stars in every system, even though two of them were undergoing outbursts. We have attempte ..."
Abstract - Add to MetaCart
-type dwarfs. There is, however, only one common abundance anomaly: extremely weak CO features. Only two of the 12 objects appeared to have normal levels of CO absorption. We interpret this as evidence of low carbon abundances. In addition, we detect 13 CO absorption in four of the 12 objects. Depleted levels

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.

Self Determining Detection of Distributed Denial of Service Attacks

by Meera A R , Jismy K Jose
"... Abstract Wireless sensor networks are mostly vulnerable to attacks. It's difficult to find /track attacker due to mobility. Indeed, the number of new attacks as well as their sophistication are continuously increasing. Diametrically opposite strategy has been studied in the last few years such ..."
Abstract - Add to MetaCart
such as unsupervised anomaly detection (UAD). UAD uses data mining techniques to extract patterns and uncover similar structures "hidden" in unlabeled traffic or unknown nature (attack or normal operation traffic), without relying on Digital signatures or baseline traffic profiles. Based on the observation

A COMPARATIVE ANALYSIS OF DATA MINING TOOLS FOR PERFORMANCE MAPPING OF WLAN DATA IJCET © I A E M E

by Mr Ajay , Assistant Professor, M Patel , Acharya Motibhai Patel , Dr A R Patel , Ms Hiral , Assistant Professor, R Patel
"... ABSTRACT Data Mining is the non-trivial process of identifying valid, potentially and understandable patterns in the form of knowledge discovery from the large volume of data. The main aim of this process is to discovering patterns and associations among preprocessed and transformed data. Data mini ..."
Abstract - Add to MetaCart
, health care, surveillance, fraud detection, scientific discovery and now a day's extensive usage in networking. Data mining supports supervised and unsupervised type of machine learning process. This paper uses the unsupervised learning process of data mining. For that the paper uses the wireless

Subspace Communication

by Josep Font-segura, Prof Gregori , 2014
"... We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed by ..."
Abstract - Add to MetaCart
by a fixed assignment of spectrum resources by regulatory agencies. This has resulted into a blind alley, as current wireless spectrum has become an expensive and a scarce resource. However, recent measurements in dense areas paint a very different picture: there is an actual underutilization

ACTA UNIVERSITATIS UPSALIENSIS

by unknown authors
"... Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after deploymen ..."
Abstract - Add to MetaCart
Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after

copyright by

by Chien-liang Fok, Chris Gill, Christine Julien, Caitlin Kelleher , 2009
"... Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many applicati ..."
Abstract - Add to MetaCart
Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
Next 10 →
Results 1 - 10 of 24
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University