From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed PCA and Network Anomaly Detection, , , , , и . UCB/EECS-2006-99. EECS Department, University of California, Berkeley, (июля 2006)Mixture Models of Endhost Network Traffic, , , , и . CoRR, (2012)Macroscope: end-point approach to networked application dependency discovery., , , , и . CoNEXT, стр. 229-240. ACM, (2009)Maximum entropy models: convergence rates and applications in dynamic system monitoring., , и . ISIT, стр. 168. IEEE, (2004)In-Network PCA and Anomaly Detection., , , , , и . NIPS, стр. 617-624. MIT Press, (2006)Spectral Clustering with Perturbed Data., , , и . NIPS, стр. 705-712. Curran Associates, Inc., (2008)Hark: A Deep Learning System for Navigating Privacy Feedback at Scale., , , , и . SP, стр. 2469-2486. IEEE, (2022)Can coexisting overlays inadvertently step on each other?, , , и . ICNP, стр. 201-214. IEEE Computer Society, (2005)How to identify and estimate the largest traffic matrix elements in a dynamic environment., , , , и . SIGMETRICS, стр. 73-84. ACM, (2004)Privacy tradeoffs in predictive analytics., , , , , и . SIGMETRICS, стр. 57-69. ACM, (2014)