Sciweavers

90 search results - page 8 / 18
» Capturing the spatio-temporal behavior of real traffic data
Sort
View
SSDBM
2000
IEEE
126views Database» more  SSDBM 2000»
15 years 2 months ago
Generating Network-Based Moving Objects
Benchmarking spatiotemporal database systems requires the definition of suitable datasets simulating the typical behavior of moving objects. Previous approaches for generating spa...
Thomas Brinkhoff
CIA
2008
Springer
14 years 11 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
MOBICOM
2010
ACM
14 years 10 months ago
Profiling users in a 3g network using hourglass co-clustering
With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for seve...
Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin...
CHI
2010
ACM
14 years 11 months ago
Facilitating meetings with playful feedback
Effective group meetings are important for the productivity of corporations. Various types of meeting facilitators have been developed over the past couple of years. We present a ...
Ying Zhang, Marshall W. Bern, Juan Liu, Kurt Partr...