Sciweavers

159 search results - page 2 / 32
» Anomaly Detection in P2P Networks Using Markov Modelling
Sort
View
GCC
2007
Springer
13 years 11 months ago
Data Persistence in Structured P2P Networks with Redundancy Schemes
Data service is the principle application in structured P2P networks. And in many cases, we need the data to persist for a long time. So how to persist the data service and how lo...
Hongxing Li, Guihai Chen
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
14 years 5 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
13 years 10 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
13 years 11 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
ACMSE
2005
ACM
13 years 10 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha