October 17, 2014

Comparative Evaluation of Spoofing Defenses |FTJ1111

Comparative Evaluation of Spoofing Defenses : IEEE2011 Abstract—IP spoofing exacerbates many security threats, and reducing it would greatly enhance Internet security. Seven de­fenses that filter spoofed […]
October 17, 2014

Clustering with Multi-Viewpoint based Similarity Measure |FTJ1110

Clustering with Multi-Viewpoint based Similarity Measure : IEEE2011 Abstract—All clustering methods have to assume some cluster relationship among the data objects that they are applied on. […]
October 17, 2014

Adaptive Provisioning of Human Expertise in Service-oriented Systems |FTJ1109

Adaptive Provisioning of Human Expertise in Service- oriented Systems : IEEE2011 ABSTRACT Web-based collaborations have become essential in today’s business environments. Due to the availability of […]
October 17, 2014

Adaptive Cluster Distance Bounding for High-Dimensional Indexing |FTJ1108

Adaptive Cluster Distance Bounding for High-Dimensional Indexing : IEEE2011 Abstract—We consider approaches for similarity search in correlated, high-dimensional data sets, which are derived within a clustering […]
October 17, 2014

A Unified Approach to Optimizing Performance in Networks serving Heterogeneous Flows |FTJ1106

A Unified Approach to Optimizing Performance in Networks serving Heterogeneous Flows : IEEE2011 Abstract— In this work, we study the control of communication networks in the […]