Learn More
With the increasing number of technology areas using Virtual Machine (VM) platforms, challenges exist in Virtual Machine migrating from one physical host to another. However, the complexity of these virtualized environments presents additional management challenges. Unfortunately, many traditional approaches may be either not effective well for reducing(More)
Collaborative filtering is one of the most successful techniques that attempts to recommend items (such as music, movies, web sites) that are likely of interest to the people. However, Existing CF technique may work poorly due to the sparse attribute inherent to the rating data. In this paper, a new mechanism that combines the user-based rating and item(More)
—During the tasks scheduling in Grid, communication delay plays an important role in Grid scheduling, which not only leads to waiting between tasks, but also results in much idle interval time between processing units. At the same time, how to make use of resources and how to select resources are also important factors. In this paper, combining the list(More)
  • Weijiang Liu
  • 2007
Traffic sampling technology has been widely deployed in front of many high-speed network applications to alleviate the great pressure on packet capturing. However, knowing the number and length of the original flows is necessary for some applications. This paper provides a novel method that uses flow statistics formed from sampled packet stream to infer the(More)
Internet attacks such as distributed denial-of-service (DDoS) attacks and worm attacks are increasing in severity. Identifying realtime attack and mitigation of Internet traffic is an important and challenging problem for network administrators. A compromised host doing fast scanning for worm propagation can make a very high number of connections to(More)
Internet attacks such as distributed denial-of-service (DDoS) attacks and worm attacks are increasing in severity. Identifying realtime attack detection and mitigation of Internet traffic is an important and challenging problem. For example, a compromised host doing fast scanning for worm propagation often makes an unusually high number of connections to(More)
Identifying elephant flows is very important in developing effective and efficient traffic engineering schemes. In addition, obtaining the statistics of these flows is also very useful for network operation and management. In this paper, we propose a novel method to identify elephant flows by introducing a Reversible Counting Bloom Filter (RCBF), a special(More)