Sciweavers

374 search results - page 73 / 75
» sum 2010
Sort
View
ITIIS
2010
172views more  ITIIS 2010»
13 years 4 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
JOCN
2010
95views more  JOCN 2010»
13 years 4 months ago
The Neural Correlates of Persuasion: A Common Network across Cultures and Media
■ Persuasion is at the root of countless social exchanges in which one person or group is motivated to have another share its beliefs, desires, or behavioral intentions. Here, w...
Emily B. Falk, Lian Rameson, Elliot T. Berkman, Be...
JUCS
2010
161views more  JUCS 2010»
13 years 4 months ago
Evaluating Linear XPath Expressions by Pattern-Matching Automata
: We consider the problem of efficiently evaluating a large number of XPath expressions, especially in the case when they define subscriber profiles for filtering of XML documen...
Panu Silvasti, Seppo Sippu, Eljas Soisalon-Soinine...
ML
2010
ACM
151views Machine Learning» more  ML 2010»
13 years 4 months ago
Inductive transfer for learning Bayesian networks
In several domains it is common to have data from different, but closely related problems. For instance, in manufacturing, many products follow the same industrial process but with...
Roger Luis, Luis Enrique Sucar, Eduardo F. Morales
PE
2010
Springer
598views Optimization» more  PE 2010»
13 years 4 months ago
Server farms with setup costs
In this paper we consider server farms with a setup cost. This model is common in manufacturing systems and data centers, where there is a cost to turn servers on. Setup costs alw...
Anshul Gandhi, Mor Harchol-Balter, Ivo Adan