Sciweavers

776 search results - page 133 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
13 years 9 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
SIGSOFT
2008
ACM
16 years 2 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
WOSS
2004
ACM
15 years 7 months ago
Combining statistical monitoring and predictable recovery for self-management
Complex distributed Internet services form the basis not only of e-commerce but increasingly of mission-critical networkbased applications. What is new is that the workload and in...
Armando Fox, Emre Kiciman, David A. Patterson
CASON
2009
IEEE
15 years 8 months ago
Social Network - An Autonomous System Designed for Radio Recommendation
This paper describes the functions of a system proposed for the music tube recommendation from social network data base. Such a system enables the automatic collection, evaluation...
Grzegorz Dziczkowski, Lamine Bougueroua, Katarzyna...
WWW
2007
ACM
16 years 2 months ago
Identifying and discriminating between web and peer-to-peer traffic in the network core
Traffic classification is the ability to identify and categorize network traffic by application type. In this paper, we consider the problem of traffic classification in the netwo...
Jeffrey Erman, Anirban Mahanti, Martin F. Arlitt, ...