enter search term and/or author name
Topology Control for Diverse Coverage in Underwater Wireless Sensor Networks
Linfeng Liu, Jingli Du, Ye Liu
Article No.: 16
Underwater wireless sensor networks (UWSNs) have been developed for a set of underwater applications, including the resource exploration, pollution monitoring, tactical surveillance, and so on. However, the complexity and diversity of the...
Online Adaptive Anomaly Detection for Augmented Network Flows
Dennis Ippoliti, Changjun Jiang, Zhijun Ding, Xiaobo Zhou
Article No.: 17
Traditional network anomaly detection involves developing models that rely on packet inspection. However, increasing network speeds and use of encrypted protocols make per-packet inspection unsuited for today’s networks. One method of...
Designing Self-Stabilizing Systems Using Game Theory
Li-Hsing Yen, Jean-Yao Huang, Volker Turau
Article No.: 18
Self-stabilizing systems tolerate transient faults by always returning to a legitimate system state within a finite time. This goal is challenged by several system features such as arbitrary system states after faults, various process execution...
Attributed Graph Rewriting for Complex Event Processing Self-Management
Wilson A. Higashino, Cédric Eichler, Miriam A. M. Capretz, Luiz F. Bittencourt, Thierry Monteil
Article No.: 19
The use of Complex Event Processing (CEP) and Stream Processing (SP) systems to process high-volume, high-velocity Big Data has renewed interest in procedures for managing these systems. In particular, self-management and adaptation of runtime...