Sciweavers

273 search results - page 27 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
93
Voted
CDC
2009
IEEE
161views Control Systems» more  CDC 2009»
15 years 4 months ago
Network structure preserving model reduction with weak a priori structural information
— This paper extends a state projection method for structure preserving model reduction to situations where only a weaker notion of system structure is available. This weaker not...
Enoch Yeung, Jorge M. Goncalves, Henrik Sandberg, ...
PE
2002
Springer
109views Optimization» more  PE 2002»
14 years 11 months ago
Load-dependent service queues with application to congestion control in broadband networks
: We analyze D/G/1 and M/G/1 queues where the service time for an arrival depends on the amount of work in the system upon arrival. The models are motivated by the bit dropping met...
Kin K. Leung
114
Voted
SDM
2003
SIAM
184views Data Mining» more  SDM 2003»
15 years 1 months ago
Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data
The problem of finding clusters in data is challenging when clusters are of widely differing sizes, densities and shapes, and when the data contains large amounts of noise and out...
Levent Ertöz, Michael Steinbach, Vipin Kumar
WCNC
2010
IEEE
14 years 9 months ago
Addressing Response Time and Video Quality in Remote Server Based Internet Mobile Gaming
A new remote server based gaming approach, where the responsibility of executing the gaming engines is put on remote servers instead of the mobile devices, has the potential for en...
Shaoxuan Wang, Sujit Dey
WEBI
2009
Springer
15 years 6 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham