Search
Now showing items 11-20 of 22
WiLDCAT: An Integrated Stealth Environment For Dynamic Malware Analysis
(Computer Science & Engineering, 2007-08-23)
Malware -- a term that refers to viruses, trojans, worms, spyware or any form of malicious code -- is widespread today. Given the devastating effects that malware have on the computing world, detecting and countering malware ...
A Framework For Improving The Performance Of Application Servers In Next Generation Networks (NGNs)
(Computer Science & Engineering, 2007-09-17)
Next generation networks (NGNs) such as IP Multimedia Subsystem (IMS) are completely built on the Internet Protocol (IP) suite. This has made IP the de facto standard for data networking, voice over IP (VoIP), and media ...
A Framework For Supporting Quality Of Service Requirements In A Data Stream Management System
(Computer Science & Engineering, 2007-08-23)
Currently, a large class of data-intensive applications, in which data are presented in the form of continuous data streams rather than static relations, has been widely recognized in the database community. Not only is ...
Inference Of Node And Edge Replacement Graph Grammars
(Computer Science & Engineering, 2007-08-23)
In this dissertation we study the inference of node and edge replacement graph grammars. The approach is based on previous research in frequent isomorphic subgraphs discovery. We extend the search for frequent subgraphs ...
Automating Inhabitant Interactions In Home And Workplace Environments Through Data-driven Generation Of Hierarchical Partially-observable Markov Decision Processes
(Computer Science & Engineering, 2007-08-23)
Markov models provide a useful representation of system behavioral actions and state observations, but they do not scale well. Utilizing a hierarchy and abstraction through hierarchical hidden Markov models (HHMMs) improves ...
Information Theoretic, Probabilistic And Maximum Partial Substructure Algorithms For Discovering Graph-based Anomalies
(Computer Science & Engineering, 2007-08-23)
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, particularly for fraud. However, ...
A Graph-based Approach For Modeling And Indexing Video Data
(Computer Science & Engineering, 2007-08-23)
With the advances in electronic imaging, storage, networking and computing, the amount of digital video has grown tremendously. The proliferation of video data has led to significant amount of research on techniques and ...
Automatic Content Analysis Of Endoscopy Video (Endoscopic Multimedia Information System)
(Computer Science & Engineering, 2007-08-23)
Advances in video technology are being incorporated into today's healthcare practice. For example, various types of endoscopes are used for colonoscopy, upper gastrointestinal endoscopy, enteroscopy, bronchoscopy, cystoscopy, ...
Probabilistic Localization Of Mobile Ad Hoc Networks
(Computer Science & Engineering, 2007-08-23)
The mobile ad hoc network localization problem deals with estimating the physical location of the nodes that do not have a direct way (e.g., GPS) to determine their own locations. Being an enabling technology that is ...
Complementing Current Active Queue Management Schemes With RECHOKe And Receiver-window Modification (RWM)
(Computer Science & Engineering, 2007-08-23)
Explicit Congestion Notification (ECN) and Active Queue Management (AQM) schemes have been proposed for present-day TCP/IP networks to better manage network congestion. ECN enabled AQMs were shown to have a promising ...