Sciweavers

1368 search results - page 33 / 274
» Modeling the Telephone Call Network
Sort
View
COMCOM
2006
121views more  COMCOM 2006»
13 years 11 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
INFOCOM
2011
IEEE
13 years 2 months ago
Making sense of customer tickets in cellular networks
—Effective management of large-scale cellular data networks is critical to meet customer demands and expectations. Customer calls for technical support provide direct indication ...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
GLOBECOM
2010
IEEE
13 years 9 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
12 years 6 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
GMP
2010
IEEE
191views Solid Modeling» more  GMP 2010»
14 years 23 days ago
Constraints on Curve Networks Suitable for G2 Interpolation
When interpolating a network of curves to create a C1 surface from spline patches, the network has to satisfy an algebraic condition, called the vertex enclosure constraint. We sho...
Thomas Hermann, Jörg Peters, Tim Strotman