Sciweavers

799 search results - page 89 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
ICWSM
2009
13 years 5 months ago
Event Detection and Tracking in Social Streams
Events and stories can be characterized by a set of descriptive, collocated keywords. Intuitively, documents describing the same event will contain similar sets of keywords, and t...
Hassan Sayyadi, Matthew Hurst, Alexey Maykov
AAAI
2000
13 years 9 months ago
Bayesian Fault Detection and Diagnosis in Dynamic Systems
This paper addresses the problem of tracking and diagnosing complex systems with mixtures of discrete and continuous variables. This problem is a difficult one, particularly when ...
Uri Lerner, Ronald Parr, Daphne Koller, Gautam Bis...
NDSS
2003
IEEE
14 years 1 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
WWW
2005
ACM
14 years 8 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
ICDCN
2010
Springer
14 years 2 months ago
Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks
Conventional wireless networks employ a contention based channel access mechanism, which not only imposes high latency but also reduces goodput of the network. Lack of interference...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...