Sciweavers

2821 search results - page 80 / 565
» Tracing a single user
Sort
View
142
Voted
VIZSEC
2005
Springer
15 years 9 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
133
Voted
ICNP
1999
IEEE
15 years 8 months ago
A Behavioral Model of Web Traffic
The growing importance of Web traffic on the Internet makes it important that we have accurate traffic models in order to plan and provision. In this paper we present a Web traffi...
Hyoung-Kee Choi, John O. Limb
127
Voted
DIS
2001
Springer
15 years 8 months ago
Knowledge Navigation on Visualizing Complementary Documents
Abstract. It is an up-to-date challenge to get answers for novel questions which nobody has ever considered. Such a question is too rare to be satisfied with a past single documen...
Naohiro Matsumura, Yukio Ohsawa, Mitsuru Ishizuka
163
Voted
IMC
2007
ACM
15 years 5 months ago
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing pat...
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-...
116
Voted
CHI
2007
ACM
16 years 4 months ago
Computer aided observations of complex mobile situations
Designing mobile and wearable applications is a challenge. The context of use is more important than ever and traditional methodologies for elicitation and specification reach the...
Tobias Klug