-
1
-
-
51349088646
-
-
Packet traces from UCLA Computer Science Department
-
Packet traces from UCLA Computer Science Department, "http://fmg- www.cs.ucla.edu/ddos/traces/."
-
-
-
-
3
-
-
0002629270
-
Maximum likelihood from incomplete data via the EM algorithm
-
A. Dempster, N. Laird, and D. Rubin, "Maximum likelihood from incomplete data via the EM algorithm," Journal of the Royal Statistical Society, vol. 39, no. B, pp. 1-38, 1977.
-
(1977)
Journal of the Royal Statistical Society
, vol.39
, Issue.B
, pp. 1-38
-
-
Dempster, A.1
Laird, N.2
Rubin, D.3
-
4
-
-
0003857778
-
A gentle tutorial on the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models
-
J. A. Bilmes, "A gentle tutorial on the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models," ICSI-TR-97-021, 1997.
-
(1997)
ICSI-TR-97-021
-
-
Bilmes, J.A.1
-
5
-
-
0000501656
-
Information theory and extension of the maximum likelihood principle
-
H. Akaike, "Information theory and extension of the maximum likelihood principle," in 2nd International Symposium on Information Theory, 1973, pp. 267-281.
-
(1973)
2nd International Symposium on Information Theory
, pp. 267-281
-
-
Akaike, H.1
-
6
-
-
51349134589
-
-
SIPp, "http://sipp.sourceforge.net."
-
-
-
-
9
-
-
31844442325
-
An analysis of TCP reset behaviour on the internet
-
February
-
M. Arlitt and C. Williamson, "An analysis of TCP reset behaviour on the internet," ACM Computer Communication Review, vol. 35, no. 1, pp. 37-44. February 2005.
-
(2005)
ACM Computer Communication Review
, vol.35
, Issue.1
, pp. 37-44
-
-
Arlitt, M.1
Williamson, C.2
-
11
-
-
0004161838
-
-
New York, NY, USA: Cambridge University Press
-
W. H. Press, B. P. Flannery, S. A. Teukolsky, and W. T. Vetterling, Numerical recipes in C: the art of scientific computing. New York, NY, USA: Cambridge University Press, 1988.
-
(1988)
Numerical recipes in C: The art of scientific computing
-
-
Press, W.H.1
Flannery, B.P.2
Teukolsky, S.A.3
Vetterling, W.T.4
-
12
-
-
0024922972
-
HMM clustering for connected word recognition
-
L.R.Rabiner, C.H.Lee, B.H.Juang, and J.G.Wilpon, "HMM clustering for connected word recognition," in proceedings of the International Conference on Acoustics, Speech and Signal Processing, 1989.
-
(1989)
proceedings of the International Conference on Acoustics, Speech and Signal Processing
-
-
Rabiner, L.R.1
Lee, C.H.2
Juang, B.H.3
Wilpon, J.G.4
-
17
-
-
0042209912
-
Model-based clustering and visualization of navigation patterns on a web site
-
I. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White, "Model-based clustering and visualization of navigation patterns on a web site," Data Mining Knowledge Discovery, vol. 7, no. 4, pp. 399-424, 2003.
-
(2003)
Data Mining Knowledge Discovery
, vol.7
, Issue.4
, pp. 399-424
-
-
Cadez, I.1
Heckerman, D.2
Meek, C.3
Smyth, P.4
White, S.5
-
19
-
-
0028667329
-
Hidden Markov monitoring for fault detection in dynamic systems
-
P.Smyth, "Hidden Markov monitoring for fault detection in dynamic systems," Pattern Recognition, vol. 27, no. 1. pp. 149-164, 1994.
-
(1994)
Pattern Recognition
, vol.27
, Issue.1
, pp. 149-164
-
-
Smyth, P.1
-
20
-
-
0028491368
-
Empirically-derived analytic models of wide-area TCP connections
-
August
-
V. Paxson, "Empirically-derived analytic models of wide-area TCP connections," IEEE/ACM Transactions on Networking, vol. 2, no. 4, August 1994.
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.4
-
-
Paxson, V.1
-
22
-
-
17644366974
-
Data streaming algorithms for efficient and accurate estimation of flow size distribution
-
A. Kumar, M. Sung, J. xu, and J. Wang, "Data streaming algorithms for efficient and accurate estimation of flow size distribution." in ACM SIGMETRICS. 2004.
-
(2004)
ACM SIGMETRICS
-
-
Kumar, A.1
Sung, M.2
xu, J.3
Wang, J.4
-
23
-
-
11244283158
-
Characterizing flows in wireless data networks
-
X. Meng, S. Wong, Y. Yuan, and S. Lu, "Characterizing flows in wireless data networks," in ACM MOBICOM, 2004.
-
(2004)
ACM MOBICOM
-
-
Meng, X.1
Wong, S.2
Yuan, Y.3
Lu, S.4
-
24
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
C.Estan, S.Savage, and G.Varghese, "Automatically inferring patterns of resource consumption in network traffic," in proceedings of ACM SIGCOMM. 2003.
-
(2003)
proceedings of ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
26
-
-
33750375994
-
Profiling Internet backbone traffic: Behavior models and applications
-
K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet backbone traffic: behavior models and applications," in ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
-
27
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
A.Lakhina, M.Crovella, and C.Diot, "Mining anomalies using traffic feature distributions," in ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
29
-
-
8344259983
-
Flow classification by histograms: Or how to go on safari in the internet
-
A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow classification by histograms: or how to go on safari in the internet." ACM SIGMETRICS Peiform. Eval. Rev., vol. 32, no. 1, pp. 49-60, 2004.
-
(2004)
ACM SIGMETRICS Peiform. Eval. Rev
, vol.32
, Issue.1
, pp. 49-60
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
Emilion, R.4
Papagiannaki, K.5
|