Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Choose an application
Choose an application
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
Mobile agents (Computer software) --- Sensor networks. --- Computer science. --- Mathematical logic. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Mathematical Logic and Formal Languages. --- Mobile Computing. --- Networks, Sensor --- Detectors --- Context-aware computing --- Multisensor data fusion --- Agents, Mobile (Computer software) --- Mobile Internet agents (Computer software) --- Intelligent agents (Computer software) --- Mobile computing. --- Electronic data processing --- Portable computers --- Informatics --- Science --- Application software. --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
Mathematical logic --- Computer science --- Information systems --- Computer. Automation --- GSM (global system for mobile communications) --- mobiele netwerken --- computers --- informatiesystemen --- wiskunde --- logica --- computerkunde
Listing 1 - 4 of 4 |
Sort by
|