Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 960348, 10 pages
http://dx.doi.org/10.1155/2013/960348
Research Article

Knee Point Search Using Cascading Top-k Sorting with Minimized Time Complexity

1Computer Network Information Center, Chinese Academy of Sciences, Beijing 100190, China
2China Organizational Name Administration Center, Beijing 100028, China
3Department of Information Science and Applications, Asia University, Taichung 41354, Taiwan

Received 20 May 2013; Accepted 20 July 2013

Academic Editors: Z. Cai and Y. Deng

Copyright © 2013 Zheng Wang and Shian-Shyong Tseng. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. M. Kang, S. Shekhar, C. Wennen, and P. Novak, “Discovering flow anomalies: a SWEET approach,” in Proceedings of the 8th IEEE International Conference on Data Mining (ICDM '08), pp. 851–856, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Hajji, “Statistical analysis of network traffic for adaptive faults detection,” IEEE Transactions on Neural Networks, vol. 16, no. 5, pp. 1053–1063, 2005. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Gao, M. K. Reiter, and D. Song, “Beyond output voting: detecting compromised replicas using HMM-based behavioral distance,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 2, pp. 96–110, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. X. Li, F. Bian, M. Crovella et al., “Detection and identification of network anomalies using sketch subspaces,” in Proceedings of the 6th ACM SIGCOMM on Internet Measurement Conference (IMC '06), pp. 147–152, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Salvador and P. Chan, “Learning states and rules for detecting anomalies in time series,” Applied Intelligence, vol. 23, no. 3, pp. 241–255, 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. Q. Zhao, V. Hautamaki, and P. Fränti, “Knee point detection in BIC for detecting the number of clusters,” in Advanced Concepts for Intelligent Vision Systems, vol. 5259 of Lecture Notes in Computer Science, pp. 664–673, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  7. C. A. R. Hoare, “Quicksort,” Computer Journal, vol. 5, no. 1, pp. 10–15, 1962. View at Google Scholar
  8. D. Knuth, Sorting and Searching, vol. 3 of The Art of Computer Programming, Addison-Wesley, New York, NY, USA, 3rd edition, 1997.
  9. H. M. Okasha and U. Rösler, “Asymptotic distributions for random median quicksort,” Journal of Discrete Algorithms, vol. 5, no. 3, pp. 592–608, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Pagter and T. Rauhe, “Optimal time-space trade-offs for sorting,” in Proceedings of the 39th Annual Symposium on Foundations of Computer Science, pp. 264–268, November 1998. View at Scopus
  11. D. Cantone and G. Cincotti, “QuickHeapsort, an efficient mix of classical sorting algorithms,” Theoretical Computer Science, vol. 285, no. 1, pp. 25–42, 2002. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Cardinal, S. Fiorini, G. Joret, R. M. Jungers, and J. I. Munro, “Sorting under partial information (without the ellipsoid algorithm),” in Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC '10), pp. 359–368, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. P. Mockapetris, “Domain names—concepts and facilities,” Internet Request for Comments (RFC, 1034), November 1987.
  14. P. Albitz and C. Liu, DNS and BIND, O'Reilly and Associates, 1998.
  15. Name server DoS Attack October, 2002, http://www.caida.org/projects/dns-analysis/.
  16. UltraDNS DOS Attack, 2002, http://www.theregister.co.uk/2002/12/14/ddos_attack_really_really_tested/.
  17. “DoS Attack against Akamai,” 2004, http://news.cnet.com/2100-1038_3-5236403.html.
  18. “ICANN Factsheet for the February 6, 2007 Root Server Attack,” 2007, http://www.icann.org/announcements/factsheet-dns-attack-08mar07_v1.1.pdf.