Sciweavers

6812 search results - page 121 / 1363
» Detection of Information Flows
Sort
View
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 1 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
116
Voted
SIGIR
2008
ACM
15 years 1 months ago
Separate and inequal: preserving heterogeneity in topical authority flows
Web pages, like people, are often known by others in a variety of contexts. When those contexts are sufficiently distinct, a page's importance may be better represented by mu...
Lan Nie, Brian D. Davison
IPOM
2009
Springer
15 years 8 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...
CNSR
2009
IEEE
102views Communications» more  CNSR 2009»
15 years 5 months ago
Online Classification of Network Flows
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani
86
Voted
CGF
2008
129views more  CGF 2008»
15 years 1 months ago
Code Flows: Visualizing Structural Evolution of Source Code
Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared...
Alexandru Telea, David Auber