Sciweavers

555 search results - page 33 / 111
» Performance Evaluation of Two Data Mining Techniques of Netw...
Sort
View
JCP
2008
119views more  JCP 2008»
13 years 7 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
AICCSA
2006
IEEE
77views Hardware» more  AICCSA 2006»
13 years 11 months ago
Evaluation of Breast Cancer Tumor Classification with Unconstrained Functional Networks Classifier
This paper proposes functional networks as an unconstrained classifier scheme for multivariate data to diagnose the breast cancer tumor. The performance of this new technique is m...
Emad A. El-Sebakhy, Kanaan A. Faisal, Tarek Helmy,...
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
14 years 8 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 2 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
DSN
2007
IEEE
14 years 2 months ago
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services
New versions of existing large-scale web services such as Passport.com© have to go through rigorous performance evaluations in order to ensure a high degree of availability. Perf...
Marcelo De Barros, Jing Shiau, Chen Shang, Kenton ...