Sciweavers

1336 search results - page 66 / 268
» SMTP Path Analysis
Sort
View
TON
2008
79views more  TON 2008»
13 years 9 months ago
A stochastic foundation of available bandwidth estimation: multi-hop analysis
This paper analyzes the asymptotic behavior of packet-train probing over a multi-hop network path carrying arbitrarily routed bursty cross-traffic flows. We examine the statistical...
Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Logu...
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 6 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
TITS
2008
250views more  TITS 2008»
13 years 9 months ago
Learning, Modeling, and Classification of Vehicle Track Patterns from Live Video
This paper presents two different types of visual activity analysis modules based on vehicle tracking. The highway monitoring module accurately classifies vehicles into eight diffe...
Brendan Tran Morris, Mohan M. Trivedi
ISCIS
2009
Springer
14 years 3 months ago
A web-based data source for metabolomics
—With the development of improved and cost-effective technologies, it is now possible to detect thousands of metabolites in biofluids or specific organs, and reliably quantify th...
Ali Cakmak, Arun Dsouza, Richard Hanson, Gultekin ...
ISORC
2008
IEEE
14 years 3 months ago
Obstacles in Worst-Case Execution Time Analysis
The analysis of the worst-case execution time (WCET) requires detailed knowledge of the program behavior. In practice it is still not possible to obtain all needed information aut...
Raimund Kirner, Peter P. Puschner