-
2
-
-
84926662675
-
Nearest Neighbor Pattern Classification
-
T. M. Cover, and P. E. Hart, "Nearest Neighbor Pattern Classification," IEEE Transactions on Information Theory, Volume IT-13(1), pp.21-27, 1967.
-
(1967)
IEEE Transactions on Information Theory
, vol.IT-13
, Issue.1
, pp. 21-27
-
-
Cover, T.M.1
Hart, P.E.2
-
3
-
-
34047212338
-
-
K. Fall and e Varadhanm, The ns Manual (formely ns Notes and Documentation), 2000.
-
K. Fall and e Varadhanm, The ns Manual (formely ns Notes and Documentation), 2000.
-
-
-
-
4
-
-
0031126049
-
-
ACM SIGCOMM Computer Communication Review
-
P. Krishna, N. H. Vaidya, M. Chatterjee, and D. K. Pradhan, "A cluster-based approach for routing in dynamic networks," ACM SIGCOMM Computer Communication Review, 1997.
-
(1997)
A cluster-based approach for routing in dynamic networks
-
-
Krishna, P.1
Vaidya, N.H.2
Chatterjee, M.3
Pradhan, D.K.4
-
6
-
-
10944266504
-
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
-
O. Younis, S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Trans, on Mobile Computing, VOL. 3, NO. 4, 2004.
-
(2004)
IEEE Trans, on Mobile Computing
, vol.3
, Issue.4
-
-
Younis, O.1
Fahmy, S.2
-
9
-
-
85117735487
-
A general cooperative intrusion detection architecture for MANETs
-
March
-
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, "A general cooperative intrusion detection architecture for MANETs," Proceedings of the Third IEEE International Workshop on Information Assurance, March 2005.
-
(2005)
Proceedings of the Third IEEE International Workshop on Information Assurance
-
-
Sterne, D.1
Balasubramanyam, P.2
Carman, D.3
Wilson, B.4
Talpade, R.5
Ko, C.6
-
10
-
-
34047236921
-
-
Cybele, Intelligent Automation Inc., http://www.i-a-i.om/view.asp'?tid= 36.
-
Cybele, Intelligent Automation Inc., http://www.i-a-i.om/view.asp'?tid= 36.
-
-
-
-
11
-
-
0036804761
-
Routing Security in Ad Hoc Networks
-
October
-
H. Deng, W. Li, and Dharma P. Agrawal, "Routing Security in Ad Hoc Networks," IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, October 2002, pp. 70-75.
-
(2002)
IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
12
-
-
0035009259
-
A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks
-
April
-
S. Banerjee and S. Khuller, "A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks," in Proceedings of IEEE INFOCOM, April 2001.
-
(2001)
Proceedings of IEEE INFOCOM
-
-
Banerjee, S.1
Khuller, S.2
-
15
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
August
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proceedings of the 6th International Conference on Mobile Computing and Networking (MOBICOM'00), pp.255-265, August 2000.
-
(2000)
Proceedings of the 6th International Conference on Mobile Computing and Networking (MOBICOM'00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
16
-
-
0242469243
-
Evolving Training Model Method for One-Class SVM
-
Washington D.C, USA
-
Q. A. Tran, Q. L. Zhang, and X. Li, "Evolving Training Model Method for One-Class SVM," Proceedings of the 2003 IEEE International Conference on Systems, Man & Cybernetics (SMC 2003), pp 2388-2393, Washington D.C., USA, 2003.
-
(2003)
Proceedings of the 2003 IEEE International Conference on Systems, Man & Cybernetics (SMC
, pp. 2388-2393
-
-
Tran, Q.A.1
Zhang, Q.L.2
Li, X.3
|