Sciweavers

114 search results - page 13 / 23
» Practical algorithms for subgroup detection in covert networ...
Sort
View
ICC
2008
IEEE
123views Communications» more  ICC 2008»
14 years 2 months ago
Impairment-Aware Manycasting over Optical Burst-Switched Networks
— In this paper we discuss the effect of physical impairments on manycasting service over the optical burstswitched (OBS) networks. Signal quality degradation in manycast network...
Balagangadhar G. Bathula, Vinod Vokkarane, Rajesh ...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 2 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
11 years 10 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 2 months ago
A Framework for Optimizing the Uplink Performance of Distributed Antenna Systems under a Constrained Backhaul
Abstract— It has recently been shown that multi-cell cooperations in cellular networks, enabling distributed antenna systems and joint transmission or joint detection across cell...
Patrick Marsch, Gerhard Fettweis
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König