Sciweavers

1411 search results - page 245 / 283
» On the modelling and performance evaluation of optical burst...
Sort
View
IFIP
2007
Springer
14 years 1 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
ICDM
2006
IEEE
110views Data Mining» more  ICDM 2006»
14 years 1 months ago
A mining method of communities keeping tacit knowledge
The research community plays a very important role in holding valuable scientific knowledge. The authors propose a community mining system which helps to find communities of res...
Ryutaro Ichise, Hideaki Takeda, Satoshi Kouno, Tai...
ICPR
2010
IEEE
13 years 11 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
MASCOTS
2003
13 years 9 months ago
Managing Flash Crowds on the Internet
A flash crowd is a surge in traffic to a particular Web site that causes the site to be virtually unreachable. We present a theoretical model of flash crowd events and evaluate...
Ismail Ari, Bo Hong, Ethan L. Miller, Scott A. Bra...
CCR
2008
76views more  CCR 2008»
13 years 7 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford