Abstract: Due to mergers and acquisitions as well as uncoordinated projects, application landscapes of today's organizations contain redundant applications (two or more applic...
For the study of traffic flow, a number of factors for traffic flow is difficult to accurate description variables with specific parameters, but in similar circumstances, traffic ...
The performance of many supervised and unsupervised learning algorithms is very sensitive to the choice of an appropriate distance metric. Previous work in metric learning and ada...
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
In this paper we present an approach to terminology recognition whereby a sublanguage term (e.g. an aircraft engine component term extracted from a maintenance log) is matched to ...