Sciweavers

2513 search results - page 418 / 503
» Experiments on Eigenfaces Robustness
Sort
View
129
Voted
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 3 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...
CORR
2010
Springer
214views Education» more  CORR 2010»
15 years 3 months ago
Modeling Network Coded TCP Throughput: A Simple Model and its Validation
We analyze the performance of TCP and TCP with network coding (TCP/NC) in lossy wireless networks. We build upon the simple framework introduced by Padhye et al. and characterize t...
MinJi Kim, Muriel Médard, João Barro...
CORR
2008
Springer
99views Education» more  CORR 2008»
15 years 3 months ago
A Model-Based Frequency Constraint for Mining Associations from Transaction Data
Mining frequent itemsets is a popular method for finding associated items in databases. For this method, support, the co-occurrence frequency of the items which form an associatio...
Michael Hahsler
CCR
2006
76views more  CCR 2006»
15 years 3 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
COMCOM
2006
100views more  COMCOM 2006»
15 years 3 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi