Sciweavers

2958 search results - page 520 / 592
» Using Anonymized Data for Classification
Sort
View
CN
2006
126views more  CN 2006»
13 years 9 months ago
A measurement study of correlations of Internet flow characteristics
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of s...
Kun-Chan Lan, John S. Heidemann
COMSUR
2006
87views more  COMSUR 2006»
13 years 9 months ago
Handover schemes in satellite networks: State-of-the-art and future research directions
Low Earth Orbit (LEO) satellites will work as an important component in future data communication networks. LEO satellites provide low end-to-end delays and efficient frequency spe...
Pulak K. Chowdhury, Mohammed Atiquzzaman, William ...
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 9 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
IJRR
2008
107views more  IJRR 2008»
13 years 9 months ago
Caging Polygons with Two and Three Fingers
: We present algorithms for computing all placements of two and three fingers that cage a given polygonal object with n edges in the plane. A polygon is caged when it is impossible...
Mostafa Vahedi, A. Frank van der Stappen
IJHPCA
2006
125views more  IJHPCA 2006»
13 years 9 months ago
Complexity Results for Collective Communications on Heterogeneous Platforms
In this paper, we consider the communications involved in the execution of a complex application, deployed on a heterogeneous platform. Such applications extensively use macro-com...
Olivier Beaumont, Loris Marchal, Yves Robert