Sciweavers

642 search results - page 104 / 129
» Stream Mining for Network Management
Sort
View

Publication
164views
13 years 8 months ago
Kangaroo: Video Seeking in P2P Systems
A key challenge faced by peer-to-peer(P2P) video-on- demand (VoD) systems is their ability, or lack thereof, to provide DVD-like functionality, such as pause, forward and backward ...
Xiaoyuan Yang, Minas Gjoka, Parminder Chhabra, Ath...
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 1 months ago
A viewpoint-based approach for interaction graph analysis
Recent innovations have resulted in a plethora of social applications on the Web, such as blogs, social networks, and community photo and video sharing applications. Such applicat...
Sitaram Asur, Srinivasan Parthasarathy
ICDM
2008
IEEE
222views Data Mining» more  ICDM 2008»
14 years 3 months ago
GRAPHITE: A Visual Query System for Large Graphs
We present Graphite, a system that allows the user to visually construct a query pattern, finds both its exact and approximate matching subgraphs in large attributed graphs, and ...
Duen Horng Chau, Christos Faloutsos, Hanghang Tong...
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 1 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...