Sciweavers

208 search results - page 18 / 42
» Real-Time Traffic Information Management using Stream Comput...
Sort
View
JDCTA
2010
143views more  JDCTA 2010»
14 years 6 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
ICNC
2005
Springer
15 years 5 months ago
An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending
In this paper, we review a visual approach and propose it for analysing computer-network activity, which is based on the use of unsupervised connectionist neural network models and...
Álvaro Herrero, Emilio Corchado, José...
EATIS
2007
ACM
15 years 3 months ago
A method using time series analysis for IEEE 802.11 WLANs channel forecasting
Abstract-- The growth of wireless network use has greatly increased research demand. Some applications, which are contextaware, must adapt to the environment. So, information on bo...
Jeandro Bezerra, Rudy Braquehais, Filipe Roberto, ...
107
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 11 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 8 days ago
Sustainable operation and management of data center chillers using temporal data mining
Motivation: Data centers are a critical component of modern IT infrastructure but are also among the worst environmental offenders through their increasing energy usage and the re...
Debprakash Patnaik, Manish Marwah, Ratnesh K. Shar...