Sciweavers

555 search results - page 83 / 111
» Performance Evaluation of Two Data Mining Techniques of Netw...
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
13 years 8 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
AINA
2008
IEEE
14 years 2 months ago
Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems Modeling
The analysis of gene expression time series obtained from microarray experiments can be effectively exploited to understand a wide range of biological phenomena from the homeostat...
Connie Phong, Raul Singh
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
PADS
2004
ACM
14 years 1 months ago
Conservative Synchronization of Large-Scale Network Simulations
Parallel discrete event simulation techniques have enabled the realization of large-scale models of communication networks containing millions of end hosts and routers. However, t...
Alfred Park, Richard M. Fujimoto, Kalyan S. Peruma...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 8 months ago
Constant-factor approximation algorithms for identifying dynamic communities
We propose two approximation algorithms for identifying communities in dynamic social networks. Communities are intuitively characterized as "unusually densely knit" sub...
Chayant Tantipathananandh, Tanya Y. Berger-Wolf