Sciweavers

130 search results - page 10 / 26
» A Method on Multimedia Service Traffic Monitoring and Analys...
Sort
View
IPCCC
2005
IEEE
14 years 1 months ago
Adapting spatial constraints of composite multimedia objects to achieve universal access
A composite multimedia object (cmo) is comprised of different media components such as text, video, audio and image, with a variety of constraints that must be adhered to. The con...
Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri
KDD
2002
ACM
173views Data Mining» more  KDD 2002»
14 years 8 months ago
LumberJack: Intelligent Discovery and Analysis of Web User Traffic Composition
Web Usage Mining enables new understanding of user goals on the Web. This understanding has broad applications, and traditional mining techniques such as association rules have bee...
Ed Huai-hsin Chi, Adam Rosien, Jeffrey Heer
APSCC
2008
IEEE
13 years 9 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 7 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
PIMRC
2008
IEEE
14 years 1 months ago
Active Highways (Position Paper)
—Highways are an essential component of our society because they are critical to quality of life and to local and national economies. Under good conditions, highways provide a sa...
Liviu Iftode, Stephen Smaldone, Mario Gerla, James...