Sciweavers

7544 search results - page 1335 / 1509
» Network Forensics Analysis
Sort
View
172
Voted
ICDM
2008
IEEE
230views Data Mining» more  ICDM 2008»
15 years 11 months ago
Evolutionary Clustering by Hierarchical Dirichlet Process with Hidden Markov State
This paper studies evolutionary clustering, which is a recently hot topic with many important applications, noticeably in social network analysis. In this paper, based on the rece...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
139
Voted
ICDM
2008
IEEE
179views Data Mining» more  ICDM 2008»
15 years 11 months ago
Detection and Exploration of Outlier Regions in Sensor Data Streams
Sensor networks play an important role in applications concerned with environmental monitoring, disaster management, and policy making. Effective and flexible techniques are need...
Conny Franke, Michael Gertz
ICDS
2008
IEEE
15 years 11 months ago
Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive Services
Reliable Server Pooling (RSerPool) is a light-weight protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. ...
Thomas Dreibholz, Erwin P. Rathgeb
150
Voted
ICPR
2008
IEEE
15 years 11 months ago
Hybrid Layered Video Encoding for Mobile Internet-Based Computer Vision and Multimedia Applications
Mobile networked environments are typically resource constrained in terms of the available bandwidth and battery capacity on mobile devices. Realtime video applications entail the ...
Suchendra M. Bhandarkar, Siddhartha Chattopadhyay,...
IEEEARES
2008
IEEE
15 years 11 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
« Prev « First page 1335 / 1509 Last » Next »