Sciweavers

6245 search results - page 177 / 1249
» A Case for Aggregate Networks
Sort
View
ISI
2008
Springer
15 years 4 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
ETS
2000
IEEE
73views Hardware» more  ETS 2000»
15 years 4 months ago
Peer Feedback in Synchronous Writing Environments: A Case Study in French
This paper reports on a case study which investigates the interaction patterns among participants in a synchronous writing environment on a Local Area Network (LAN). The focus is ...
Trude Heift, Catherine Caws
EMMCVPR
2003
Springer
15 years 9 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
SIGMETRICS
1997
ACM
153views Hardware» more  SIGMETRICS 1997»
15 years 8 months ago
Queue Management for Explicit Rate Based Congestion Control
Rate based congestion control has been considered desirable, both to deal with the high bandwidth-delay products of today's high speed networks, and to match the needs of eme...
Qingming Ma, K. K. Ramakrishnan
ISSA
2004
15 years 5 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski