• Non ci sono risultati.

Riferimenti bibliografici

N/A
N/A
Protected

Academic year: 2021

Condividi "Riferimenti bibliografici"

Copied!
2
0
0

Testo completo

(1)

135

Riferimenti bibliografici

[1] M. Durand and P.Flajolet, “ Loglog counting of large cardinalities”, in In Esa, pp. 605-617, 2003.

[2] M. Thorup and Y. Zhang, “Tabulation based 4-universal hashing with applications to second moment estimation”, in Proceeding of the annual ACM-SIAm symposium on Discrete algorithms (SODA), (Phladelphia, PA, USA), pp. 615-624, Society for Industrial and Applied Mathematics, 2004.

[3] R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, E. Parsons, Y. Zhangy, P. Dinda, M. Kao, G. Memik, “Reversible sketches: enabling monitoring and analysis over high-speed data streams”, in IEEE/ACM Transactions on Networking, Volume 15, Issue 5, Oct. 2007.

[4] B. Krishnamurthy, S. Sen, Y. Zhang, “Sketch-based Change Detection: Methods, Evaluation, and Applications”, IMC’03, October 27–29, 2003, Miami Beach, Florida, USA. [5] O.Salem, S. Vaton, A. Gravey, “A scalable, efficient and informative approach for anomaly-based intrusion detection systems: theory and practice”, in International Journal of Network Management Volume 20 Issue 5, September 2010.

(2)

136

[6] “The Internet2 Network.”

http://www.internet2.edu/network

[7] Jacquet P., Szpankowski W, “Analytical depoissonizationn and its applications”, Theoretical Computer Science 201,1-2 (1998).

Riferimenti

Documenti correlati

Clinical studies 1 provided evidence that abnormalities in blood flow properties may contribute to cardiovascular events, and an altered hemorheologic pro- file, which

inquadramento sistematico della problematica dicotomia rifugiato-migrante economico. Il patto globale per una migrazione sicura, ordinata e regolare: tutto cambia affinché

13 stabilisce che: “le caratteristiche dei corsi di foormazione per il connseguimento della specializzazione per le attività di sostegno didattico agli alunni con disabilità, che

from the Khibiny alkaline massif, Kola Peninsula, Russia; the complete chemical analysis

Currently, although the majority of works focus on research- ing algorithms that can yield improved detection results, a few studies have been dedicated to evaluating the reliability

Key-Words: - condition monitoring, unsupervised machine learning, self-organizing maps, abnormality isolator, artificial neural networks, fault detections.. 1

purpose of this article is to introduce the use of mobile agents as a tool for new types of information security solutions, to show their advantages and disadvantages in this

Canizares et al., “Benchmark models for the analysis and control of small-signal oscillatory dynamics in power systems,” IEEE Trans.. Power