Sciweavers

1217 search results - page 53 / 244
» On compressing frequent patterns
Sort
View
138
Voted
WSC
2008
15 years 6 months ago
Phrase based browsing for simulation traces of network protocols
Most discrete event simulation frameworks are able to output simulation runs as a trace. The Network Simulator 2 (NS2) is a prominent example that does so to decouple generation o...
Nathan J. Schmidt, Peter Kemper
139
Voted
JSAC
2006
165views more  JSAC 2006»
15 years 3 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
129
Voted
DATE
2009
IEEE
138views Hardware» more  DATE 2009»
15 years 10 months ago
Cache aware compression for processor debug support
—During post-silicon processor debugging, we need to frequently capture and dump out the internal state of the processor. Since internal state constitutes all memory elements, th...
Anant Vishnoi, Preeti Ranjan Panda, M. Balakrishna...
129
Voted
AAAI
2004
15 years 5 months ago
Compressing Pattern Databases
A pattern database is a heuristic function stored as a lookup table which stores the lengths of optimal solutions for instances of subproblems. All previous pattern databases had ...
Ariel Felner, Ram Meshulam, Robert C. Holte, Richa...
97
Voted
DATESO
2007
85views Database» more  DATESO 2007»
15 years 5 months ago
Improvement of Text Compression Parameters Using Cluster Analysis
Abstract. Several actions are usually performed when document is appended to textual database in information retrieval system. The most frequent actions are compression of the docu...
Jiri Dvorský, Jan Martinovic