In this paper, a modeling toolkit is proposed for modeling user behavior from FTP server log files. This toolkit can develop analytical models from the data at hand with minimum a...
Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...
Usage-based pricing of offered traffic to a data network can be an effective technique for congestion control. To gain insight into the benejits usage-based pricing offers, we pro...
In this paper, we demonstrate a novel landmark photo search and browsing system, Agate, which ranks landmark image search results considering their relevance, diversity and qualit...
Yuheng Ren, Mo Yu, Xin-Jing Wang, Lei Zhang, Wei-Y...
Abstract--Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the...