-
1
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
-
February
-
Leonard E Baum, Ted Petrie, George Soules, and Norman Weiss. A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Annals of Mathematical Statistics, 41(1): 164-171, February 1970.
-
(1970)
Annals of Mathematical Statistics
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.E.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
2
-
-
33646890686
-
Traffic classification on the fly
-
April
-
Laurent Bernaille, Renata Teixeira, Ismael Akodkenou, Augustin Soule, and Kave Salamatian. Traffic classification on the fly. ACM SIGCOMM Computer Communication Review, 36(2):23-26, April 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
9
-
-
0029259085
-
Maximum discrimination hidden Markov models of sequence consensus
-
Sean Eddy, Graeme Mitchison, and Richard Durbin. Maximum discrimination hidden Markov models of sequence consensus. Journal of Computational Biology, 2:9-23, 1995.
-
(1995)
Journal of Computational Biology
, vol.2
, pp. 9-23
-
-
Eddy, S.1
Mitchison, G.2
Durbin, R.3
-
10
-
-
33845761159
-
Data cleansing and preparation at the gates: A data-streaming perspective
-
August
-
Don Faxon, R Duane King, John T Rigsby, Steve Bernard, and Edward J Wegman. Data cleansing and preparation at the gates: A data-streaming perspective. In 2004 Proceedings of the American Statistical Association, August 2004.
-
(2004)
2004 Proceedings of the American Statistical Association
-
-
Faxon, D.1
King, R.D.2
Rigsby, J.T.3
Bernard, S.4
Wegman, E.J.5
-
11
-
-
33845787707
-
-
Federal Information Processing Standards, November
-
Federal Information Processing Standards. Advanced Encryption Standard (AES) - FIPS 197, November 2001.
-
(2001)
Advanced Encryption Standard (AES) - FIPS
, vol.197
-
-
-
14
-
-
33646889653
-
BLINC: Multilevel traffic classification in the dark
-
to appear, August
-
Thomas Karagiannis, Konstantina Papagiannaki, and Michails Faloutsos. BLINC: Multilevel traffic classification in the dark. In ACM SIGCOMM, to appear, August 2005.
-
(2005)
ACM SIGCOMM
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
17
-
-
0028181441
-
Hidden Markov Models in computational biology: Applications to protein modeling
-
February
-
Anders Krogh, Michael Brown, I Saira Mian, Kimmen Sjölander, and David Haussler. Hidden Markov Models in computational biology: Applications to protein modeling. Journal of Molecular Biology, 235(5):1501-1531, February 1994.
-
(1994)
Journal of Molecular Biology
, vol.235
, Issue.5
, pp. 1501-1531
-
-
Krogh, A.1
Brown, M.2
Mian, I.S.3
Sjölander, K.4
Haussler, D.5
-
20
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
January
-
Richard P Lippmann, David J Fried, Isaac Graf, Joshua W Haines, Kristopher R Kendall, David McClung, Dan Weber, Seth E Webster, Dan Wyschogrod, Robert K Cunningham, and Marc A Zissmann. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, January 2000.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissmann, M.A.11
-
22
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
November
-
John McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security, 3(4):262-294, November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
24
-
-
14344265818
-
Internet traffic classification using Bayesian analysis techniques
-
June
-
Andrew W Moore and Denis Zuev. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS, June 2005.
-
(2005)
ACM SIGMETRICS
-
-
Moore, A.W.1
Zuev, D.2
-
25
-
-
0028491368
-
Emprically-derived analytic models of wide-area tcp connections
-
August
-
Vern Paxson. Emprically-derived analytic models of wide-area tcp connections. IEEE/ACM Transactions on Networking, 2(4):316-336, August 1994.
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.4
, pp. 316-336
-
-
Paxson, V.1
-
27
-
-
4944252468
-
Using hidden Markov models to analyze gene expression time course data
-
July
-
Alexander Schliep, Alexander Schönhuth, and Christine Steinhoff. Using hidden Markov models to analyze gene expression time course data. Bioinformatics, 19(supplement 1):i255-i263, July 2003.
-
(2003)
Bioinformatics
, vol.19
, Issue.SUPPL. 1
-
-
Schliep, A.1
Schönhuth, A.2
Steinhoff, C.3
-
29
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
May
-
Qixiang Sun, Daniel R Simon, Yi-Min Wang, Will Russell, Venkata N Padmanabhan, and Lili Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of the IEEE Symposium on Security and Privacy, pages 19-30, May 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
30
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
Andrew J Viterbi. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory, IT-13:260-267, 1967.
-
(1967)
IEEE Transactions on Information Theory
, vol.IT-13
, pp. 260-267
-
-
Viterbi, A.J.1
-
35
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
August
-
Kuai Xu, Zhi-Li Zhang, and Supratik Bhattacharya. Profiling internet backbone traffic: Behavior models and applications. In SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pages 169-180, August 2005.
-
(2005)
SIGCOMM '05: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharya, S.3
|