Sciweavers

1103 search results - page 160 / 221
» Evaluating CBR Systems Using Different Data Sources: A Case ...
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
COMCOM
2006
87views more  COMCOM 2006»
13 years 8 months ago
Practical utilities for monitoring multicast service availability
Monitoring has become one of the key issues for the successful deployment of IP multicast in the Internet. During the last decade, several tools and systems have been developed to ...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
TPDS
2010
155views more  TPDS 2010»
13 years 6 months ago
Streamline: An Optimal Distribution Algorithm for Peer-to-Peer Real-Time Streaming
—In this paper we propose and evaluate an overlay distribution algorithm for P2P, chunk-based, streaming systems over forest-based topologies. In such systems, the stream is divi...
Giuseppe Bianchi, Nicola Blefari-Melazzi, Lorenzo ...
ICDE
2010
IEEE
154views Database» more  ICDE 2010»
13 years 8 months ago
Processing online news streams for large-scale semantic analysis
— While Internet has enabled us to access a vast amount of online news articles originating from thousands of different sources, the human capability to read all these articles h...
Milos Krstajic, Florian Mansmann, Andreas Stoffel,...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 6 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang