Data mining algorithms for communication networks control: concepts, survey and guidelines
暂无分享,去创建一个
[1] Kayhan Zrar Ghafoor,et al. A smart handover prediction system based on curve fitting model for Fast Mobile IPv6 in wireless networks , 2012, Int. J. Commun. Syst..
[2] Tao Liu,et al. Foresee (4C): Wireless link prediction using link features , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.
[3] Kavé Salamatian,et al. Anomaly extraction in backbone networks using association rules , 2009, IMC '09.
[4] Y. Watanabe,et al. Visualizing Network Status , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[5] Jun Zhang,et al. Internet Traffic Classification Using Constrained Clustering , 2014, IEEE Transactions on Parallel and Distributed Systems.
[6] Philippe Owezarski,et al. Knowledge-independent traffic monitoring: Unsupervised detection of network attacks , 2012, IEEE Network.
[7] J. Cid-Sueiro,et al. Q-Probabilistic Routing in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[8] Anni Cai,et al. SVM-based loss differentiation mechanism in mobile ad hoc networks , 2009, 2009 Global Mobile Congress.
[9] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[10] Xiaojun Wang,et al. Pattern Mining Model for Automatic Network Monitoring in Heterogeneous Wireless Communication Networks , 2014 .
[11] Zhuo Yang,et al. MAC protocol identification using support vector machines for cognitive radio networks , 2014, IEEE Wireless Communications.
[12] Sherif Rashad,et al. PAC-WHN: Predictive Admission Control for Wireless Heterogeneous Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[13] D. Wolpert. The Supervised Learning No-Free-Lunch Theorems , 2002 .
[14] Satinder Singh,et al. Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.
[15] Mingyan Liu,et al. Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study , 2009, IEEE Transactions on Mobile Computing.
[16] Renata Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[17] Luca Salgarelli,et al. Support Vector Machines for TCP traffic classification , 2009, Comput. Networks.
[18] Pierre Geurts,et al. A machine learning approach to improve congestion control over wireless computer networks , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[19] Dongjoon Kong,et al. A differentiated one-class classification method with applications to intrusion detection , 2012, Expert Syst. Appl..
[20] D. Edwards. Data Mining: Concepts, Models, Methods, and Algorithms , 2003 .
[21] Aldebaro Klautau,et al. A Front End for Discriminative Learning in Automatic Modulation Classification , 2011, IEEE Communications Letters.
[22] Robert W. Heath,et al. A Supervised Learning Approach to Adaptation in Practical MIMO-OFDM Wireless Systems , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[23] Sebastian Zander,et al. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.