Statistical Methods for the Analysis of Network Data
نویسندگان
چکیده
14:00-14:45 " Network-based auto-probit modeling with application to protein function prediction " Eric D. Kolaczyk 09:35-10:10 " Quantifying and comparing complexity of cellular networks: structure beyond degree statistics " Alessia Annibale and Anthony Coolen 10:10-10:45 " Node and link roles in protein-protein interaction networks " " Using Distinct Aspects of Social Network Analysis to Improve the Customer Loyalty Process " Carlos Andre Reis Pinheiro and Markus Helfert " Translating evidence into practice: a shared priority in public health? " " An inferential approach for one-sample gene network comparisons: assessing dissimilarity via a resampled local covering metric " Phillip Yates and Nitai Mukhopadhyay " Analysis of a web-based network of educators " " Inferences for Differential Transmission Rates of an Infectious Disease on a Network " Rachel Schutt " Uncertainties in network analysis due to the thresholding problem " Andrew Thomas " Sensitivity of Spectral Clustering. Similarities between Spectral Clustering and Multidimen-sional Scaling " Zhivko Stoyanov 6
منابع مشابه
Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملClassification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کاملApplying Network Data Envelopment Analysis to Determine a Criterion for Benchmarking in Regional Electricity Companies of Iran.
One of the effective methods for improving the efficiency of an organization is benchmarking against successful organizations. Not only benchmarking could be a technique for identifying problems but also it greatly helps managers in relations of the design of processes. Among strategic and infrastructure industries in each country, the electricity industry is one of the most important and criti...
متن کاملAn Elaboration of the Dynamic Growth Pattern of Iran’s Share in Regional Natural Gas Trade through Factor Prioritization, Using Network Analysis
This study presents a strategic viewpoint of the dynamic growth pattern of Iran’s share in regional natural gas trade, through factor prioritization, using network analysis. The study is an exploratory one, which falls under the cross-sectional category based on its research method and time frame for gathering pertinent data. This study has been conducted over the period 2019 to 2020. The main ...
متن کاملAn Irregular Lattice Pore Network Model Construction Algorithm
Pore network modeling uses a network of pores connected by throats to model the void space of a porous medium and tries to predict its various characteristics during multiphase flow of various fluids. In most cases, a non-realistic regular lattice of pores is used to model the characteristics of a porous medium. Although some methodologies for extracting geologically realistic irregular net...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009