Sciweavers

4184 search results - page 647 / 837
» Names of Our Lives
Sort
View
CN
2006
126views more  CN 2006»
15 years 1 months ago
A measurement study of correlations of Internet flow characteristics
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of s...
Kun-Chan Lan, John S. Heidemann
COMCOM
2006
112views more  COMCOM 2006»
15 years 1 months ago
Performance modelling and evaluation of IEEE 802.11 distributed coordination function in multihop wireless networks
Initially designed for WLAN's, IEEE 802.11 medium access control (MAC) has also been widely used in the research of multihop wireless networks. The core MAC technique of IEEE ...
Jun He, Hung Keng Pung
DKE
2006
110views more  DKE 2006»
15 years 1 months ago
Efficient mining of group patterns from user movement data
In this paper, we present a new approach to derive groupings of mobile users based on their movement data. We assume that the user movement data are collected by logging location ...
Yida Wang, Ee-Peng Lim, San-Yih Hwang
DKE
2006
126views more  DKE 2006»
15 years 1 months ago
FRACTURE mining: Mining frequently and concurrently mutating structures from historical XML documents
In the past few years, the fast proliferation of available XML documents has stimulated a great deal of interest in discovering hidden and nontrivial knowledge from XML repositori...
Ling Chen 0002, Sourav S. Bhowmick, Liang-Tien Chi...
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 1 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin