-
1
-
-
33646869932
-
Self-Similarity Traffic and Network Dynamics
-
May
-
Erramilli, M. Roughan, D. Veitch, and W. Willinger, "Self-Similarity Traffic and Network Dynamics," Proceedings of the IEEE, vol. 90, no. 5, May 2002, pp. 800-819.
-
(2002)
Proceedings of the IEEE
, vol.90
, Issue.5
, pp. 800-819
-
-
Erramilli1
Roughan, M.2
Veitch, D.3
Willinger, W.4
-
2
-
-
0036082321
-
A Hidden Semi-Markov Model for Web Workload SelfSimilarity
-
April 3-5, Phoenix, AZ
-
S.-Z. Yu, Z. Liu, M. S. Squillante, C. Xia, and L. Zhang, "A Hidden Semi-Markov Model for Web Workload SelfSimilarity," Proc. of The 21st IEEE International Performance, Computing, and Communications Conference (IPCCC 2002), pp. 65-72, April 3-5, 2002, Phoenix, AZ.
-
(2002)
Proc. of The 21st IEEE International Performance, Computing, and Communications Conference (IPCCC
, pp. 65-72
-
-
Yu, S.-Z.1
Liu, Z.2
Squillante, M.S.3
Xia, C.4
Zhang, L.5
-
3
-
-
0035153870
-
A statistical approach to predictive detection
-
Jan
-
J. L. Hellerstein, Z. Fan, P. Shahabuddin, "A statistical approach to predictive detection," Computer Networks (Netherlands) Vol.35, No.l Jan. 2001, P77-95.
-
(2001)
Computer Networks (Netherlands)
, vol.35
, Issue.L
-
-
Hellerstein, J.L.1
Fan, Z.2
Shahabuddin, P.3
-
4
-
-
0142135002
-
Workload Characterization
-
September ·October
-
D.A. Menasce, "Workload Characterization," IEEE Internet Computing, September ·October, 2003, pp. 89-91.
-
(2003)
IEEE Internet Computing
, pp. 89-91
-
-
Menasce, D.A.1
-
5
-
-
0042855741
-
A hierarchical and multiscale approach to analyze E-business workloads
-
Sept
-
D.A. Menasce, V.A.F. Almeida, R. Riedi, F. Ribeiro, R. Fonseca, W. Meria, "A hierarchical and multiscale approach to analyze E-business workloads," Performance Evaluation, v 54, n 1, Sept. 2003, p 33-57.
-
(2003)
Performance Evaluation
, vol.54
, Issue.1
, pp. 33-57
-
-
Menasce, D.A.1
Almeida, V.A.F.2
Riedi, R.3
Ribeiro, F.4
Fonseca, R.5
Meria, W.6
-
6
-
-
51849119910
-
Characterization of a campus network traffic
-
Jan
-
A. Waheed, "Characterization of a campus network traffic," Pakistan Journal of Applied Sciences, vol. 3, no.1, Jan. 2003, pp. 40-6.
-
(2003)
Pakistan Journal of Applied Sciences
, vol.3
, Issue.1
, pp. 40-46
-
-
Waheed, A.1
-
7
-
-
85131751111
-
Characterization of e-commerce traffic
-
U. Vallamsetty, K. Kant, P. Mohapatra, "Characterization of e-commerce traffic," Electronic Commerce Research, vol. 3, no. 1-2, 2003, pp. 167-92.
-
(2003)
Electronic Commerce Research
, vol.3
, Issue.1-2
, pp. 167-192
-
-
Vallamsetty, U.1
Kant, K.2
Mohapatra, P.3
-
8
-
-
11844299203
-
Characterization of a Large Web Site Population withImplications for Content Delivery
-
May 17-22, New York, USA. pp
-
L. Bent, M. Rabinovich, G. M. Voelker and Z. Xiao, "Characterization of a Large Web Site Population withImplications for Content Delivery," WWW2004, May 17-22, 2004, New York, USA. pp. 522-533.
-
(2004)
WWW2004
, pp. 522-533
-
-
Bent, L.1
Rabinovich, M.2
Voelker, G.M.3
Xiao, Z.4
-
9
-
-
0042209912
-
Model-based clustering and visualization of navigation patterns on a Web site
-
Oct
-
I. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White, "Model-based clustering and visualization of navigation patterns on a Web site," Data Mining and Knowledge Discovery, vol. 7, no.4, Oct. 2003, pp. 399-424.
-
(2003)
Data Mining and Knowledge Discovery
, vol.7
, Issue.4
, pp. 399-424
-
-
Cadez, I.1
Heckerman, D.2
Meek, C.3
Smyth, P.4
White, S.5
-
10
-
-
14944383480
-
Class-of-Service Mapping for QoS: A statistical signaturebased approach to IP traffic classification
-
M. Roughan, S. Sen, O. Spatscheck, N. Duffield, "Class-of-Service Mapping for QoS: A statistical signaturebased approach to IP traffic classification," ACM Sigcomm Internet Measurement Workshop 2004, pp. 1-14.
-
(2004)
ACM Sigcomm Internet Measurement Workshop
, pp. 1-14
-
-
Roughan, M.1
Sen, S.2
Spatscheck, O.3
Duffield, N.4
-
11
-
-
0024610919
-
A tutorial on hidden Markov models and selected application in speech recognition
-
Feb
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected application in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, Feb. 1989, pp. 257-286.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
14
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows using hidden Markov model
-
January
-
S-B. Cho and H-J. Park,"Efficient anomaly detection by modeling privilege flows using hidden Markov model," Computers & Security, Volume 22, Issue 1, January 2003, Pages 45-55.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.-B.1
Park, H.-J.2
-
15
-
-
34247391599
-
System approach to intrusion detection using hidden Markov model
-
Pages:, Vancouver, British Columbia, Canada
-
R. Khanna, H. Liu, "System approach to intrusion detection using hidden Markov model," Proceedings of the 2006 international conference on Wireless communications and mobile computing, Pages: 349 - 354, 2006, Vancouver, British Columbia, Canada.
-
(2006)
Proceedings of the 2006 international conference on Wireless communications and mobile computing
, pp. 349-354
-
-
Khanna, R.1
Liu, H.2
-
16
-
-
84885913899
-
Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network
-
Dec. 8-10, Suzhou, China
-
J. Kang and Y. Zhang and J-B. Ju,"Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network," Proceedings of 5th International Conference on Cryptology and Network Security, (CANS 2006), pp. 342-353, Dec. 8-10, 2006, Suzhou, China.
-
(2006)
Proceedings of 5th International Conference on Cryptology and Network Security, (CANS
, pp. 342-353
-
-
Kang, J.1
Zhang, Y.2
Ju, J.-B.3
|