Sciweavers

2958 search results - page 520 / 592
» Using Anonymized Data for Classification
Sort
View
94
Voted
CN
2006
126views more  CN 2006»
15 years 18 days ago
A measurement study of correlations of Internet flow characteristics
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of s...
Kun-Chan Lan, John S. Heidemann
94
Voted
COMSUR
2006
87views more  COMSUR 2006»
15 years 18 days ago
Handover schemes in satellite networks: State-of-the-art and future research directions
Low Earth Orbit (LEO) satellites will work as an important component in future data communication networks. LEO satellites provide low end-to-end delays and efficient frequency spe...
Pulak K. Chowdhury, Mohammed Atiquzzaman, William ...
117
Voted
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 17 days ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
89
Voted
IJRR
2008
107views more  IJRR 2008»
15 years 17 days ago
Caging Polygons with Two and Three Fingers
: We present algorithms for computing all placements of two and three fingers that cage a given polygonal object with n edges in the plane. A polygon is caged when it is impossible...
Mostafa Vahedi, A. Frank van der Stappen
IJHPCA
2006
125views more  IJHPCA 2006»
15 years 17 days ago
Complexity Results for Collective Communications on Heterogeneous Platforms
In this paper, we consider the communications involved in the execution of a complex application, deployed on a heterogeneous platform. Such applications extensively use macro-com...
Olivier Beaumont, Loris Marchal, Yves Robert