Sciweavers

Share
ISF
2010
164views more  ISF 2010»
8 years 6 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
SSDBM
2010
IEEE
142views Database» more  SSDBM 2010»
8 years 7 months ago
Efficient and Adaptive Distributed Skyline Computation
Skyline queries have attracted considerable attention over the last few years, mainly due to their ability to return interesting objects without the need for user-defined scoring f...
George Valkanas, Apostolos N. Papadopoulos
IPPS
2010
IEEE
8 years 7 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
TOMACS
2002
110views more  TOMACS 2002»
8 years 9 months ago
Rapid model parameterization from traffic measurements
The utility of simulations and analysis heavily relies on good models of network traffic. While network traffic constantly changing over time, existing approaches typically take y...
Kun-Chan Lan, John S. Heidemann
PE
2002
Springer
118views Optimization» more  PE 2002»
8 years 9 months ago
Procedures and tools for analysis of network traffic measurements
We present procedures and tools for the analysis of network traffic measurements. The tools consist of stand-alone 1 modules that implement advanced statistical analysis procedure...
Costas Courcoubetis, Vasilios A. Siris
CN
1998
77views more  CN 1998»
8 years 9 months ago
Variations in Cache Behavior
HTTP cache servers reduce network traffic by storing popular files nearer to the client and have been implemented worldwide. Their reported performance on key metrics such as hit ...
Chris M. Roadknight, Ian W. Marshall
CN
1998
118views more  CN 1998»
8 years 9 months ago
Predicting Network Traffic for Collaborative Virtual Environments
We introduce a method for predicting the network traffic that will be generated by Collaborative Virtual Environment applications with varying numbers of participants. Statistical...
Chris Greenhalgh, Steve Benford, Adrian Bullock, N...
TPDS
2008
93views more  TPDS 2008»
8 years 9 months ago
Evaluating Dynamic Task Mapping in Network Processor Runtime Systems
Modern network processor systems require the ability to adapt their processing capabilities at runtime to changes in network traffic. Traditionally, network processor applications ...
Xin Huang, Tilman Wolf
SIGMETRICS
2008
ACM
8 years 9 months ago
Long range mutual information
Network traffic modeling generally views traffic as a superposition of flows that creates a timeseries of volume counts (e.g. of bytes or packets). What is omitted from this view ...
Nahur Fonseca, Mark Crovella, Kavé Salamati...
IJISEC
2006
119views more  IJISEC 2006»
8 years 9 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
books