Structural Analysis of Network Traffic Flows Eric Kolaczyk
|
|
|
- Melissa McBride
- 10 years ago
- Views:
Transcription
1 Structural Analysis of Network Traffic Flows Eric Kolaczyk Anukool Lakhina, Dina Papagiannaki, Mark Crovella, Christophe Diot, and Nina Taft
2 Traditional Network Traffic Analysis Focus on Short stationary timescales Traffic on a single link in isolation Principal results Scaling properties Packet delays and losses What ISPs Care About Focus on Long, nonstationary timescales Traffic on all links simultaneously Principal goals Capacity planning Traffic engineering Anomaly detection 2
3 Need for Whole-Network Traffic Analysis Traffic Engineering: How does traffic move throughout the network? Anomaly Detection: Which links show unusual traffic? Capacity planning: How much and where in network to upgrade? 3
4 This is Complicated! Measuring and modeling traffic on all links simultaneously is challenging. Even single link modeling is difficult 100s of links in large IP networks High-Dimensional timeseries Significant correlation in link traffic Is there a more fundamental representation? 4
5 Origin-Destination Flows total traffic on the link traffic time Link traffic arises from the superposition of Origin- Destination (OD) flows Modeling OD flows instead of link traffic removes a significant source of correlation A fundamental primitive for whole-network analysis 5
6 But, This Is Still Complicated Even more OD flows than links Still a high dimensional, multivariate timeseries How do we extract meaning from this high dimensional structure in a systematic manner? 6
7 High Dimensionality: A General Strategy Look for good low-dimensional representations Often a high-dimensional structure can be explained by a small number of independent variables A commonly used technique: Principal Component Analysis (PCA) (aka KL-Transform, SVD, ) 7
8 Our work Measure complete sets of OD flow timeseries from two backbone networks Use PCA to understand their structure Decompose OD flows into simpler features Characterize individual features Reconstruct OD flows as sum of features Call this structural analysis 8
9 Datasets Abilene: 11 PoPs, 121 OD flows. Sprint-Europe: 13 PoPs, 169 OD flows. Collect sampled traffic from every ingress link using NetFlow Use BGP tables to resolve egress points Week-long datasets, 5- or 10-minute timesteps 9
10 Example OD Flows 5.5 x 107 x 10 6 x x Traffic in OD Flow Traffic in OD Flow Traffic in OD Flow Traffic in Ab. OD Flow x 10 7 x 10 5 x 10 6 x Traffic in Ab. OD Flow Traffic in OD Flow Traffic in Ab. OD Flow Traffic in OD Flow x 10 4 x 10 5 x 10 8 x Traffic in OD Flow Traffic in OD Flow Traffic in OD Flow Traffic in OD Flow Some have visible structure, some less so 10
11 Specific Questions of Structural Analysis Are there low dimensional representations for a set of OD flows? Do OD flows share common features? What do the features look like? Can we get a high-level understanding of a set of OD flows in terms of these features? 11
12 Principal Component Analysis Coordinate transformation method Original Data Transformed Data x1, x2 u1, u2 12
13 Properties of Principle Components Each PC in the direction of maximum (remaining) energy in the set of OD flows Ordered by amount of energy they capture Eigenflow: set of OD flows mapped onto a PC; a common trend Ordered by most common to least common trend 13
14 PCA on OD flows # OD pairs # OD pairs # OD pairs time time # OD pairs OD flow Eigenflow PC X: OD flow matrix U: Eigenflow matrix V: Principal matrix X=UΣV T 14
15 PCA on OD flows (2) Each eigenflow is a weighted sum of all OD flows = Eigenflows are orthonormal ; Singular values indicate the energy attributable to a principal component Each OD flow is weighted sum of all eigenflows =
16 An Example Eigenflow and PC Eigenflow x 10 4 OD Flow Time Traffic in OD Flow PC x OD Flow OD Flow Traffic in OD Flow
17 Outline For Rest of Talk Find intrinsic dimensionality of OD flows Decompose OD flows Characterize eigenflows Reconstruct OD flows Structural Analysis Potential applications 17
18 Low Intrinsic Dimensionality of OD Flows Sprint 1 Abilene 0.8 Magnitude Magnitude Plot of (square root of) energy captured by each dimension Singular Values Singular Values 18
19 Approximating With Top 5 Eigenflows x Original 5 PC 3 Traffic in OD Flow
20 Approximating With Top 5 Eigenflows 2.5 x 10 7 Original 5 PC Traffic in OD Flow
21 Approximating With Top 5 Eigenflows x Original 5 PC 6 Traffic in OD Flow
22 Outline Find intrinsic dimensionality of OD flows Decompose OD flows Characterize eigenflows Reconstruct OD flows Structural Analysis Potential applications 22
23 Structure of OD Flows Pr[X<x] Sprint 1 Abilene Most OD flows have less than 20 significant eigenflows Can think of each OD flow as having only a small set of features Number of Eigenflows in an OD flow 23
24 Kinds of Eigenflows Eigenflow Eigenflow Eigenflow Deterministic d-eigenflows Spike s-eigenflows Noise n-eigenflows Predictable (periodic) trends Sudden, isolated spikes and drops Roughly stationary and Gaussian 24
25 D-eigenflows Have Periodicity Sprint 1 Abilene Eigenflow FFT Energy Hours Power spectrum 25
26 S-eigenflows Have Spikes 0.3 Sprint 1 Eigenflow Abilene Eigenflow 10 5-sigma threshold
27 N-eigenflows Are Gaussian 0.1 Quantiles of Input Sample Sprint 1 Abilene Standard Normal Quantiles Eigenflow qq-plot 27
28 Hundreds of Eigenflows But Only Three Basic Types 28
29 An OD Flow, Reconstructed x x 10 7 x 10 6 Original d eigenflows s eigenflows OD flow D-components S-components x n eigenflows 0 5 N-components 29
30 Another OD Flow, Reconstructed x Original 4 2 OD flow x d eigenflows 2 0 D-components 2 x 10 7 s eigenflows 0 2 S-components x n eigenflows 0 2 N-components 30
31 Which Eigenflows Are Most Significant? N n eigenflow S s eigenflow D d eigenflow N n eigenflow S s eigenflow D d eigenflow Sprint Eigenflows in order Abilene Eigenflows in order 1-6: d-eigenflows appear to be most significant in both networks. 5-10: s-eigenflows are next important. 12 and beyond: n-eigenflows account for rest. 31
32 Contribution of Eigenflow Types Fraction of total OD flow energy captured by each type of eigenflow 32
33 Contribution to Each OD Flow (Sprint) Fraction of Total Energy (Sprint) Deterministic Spike Noise OD Flow (large to small) Largest OD flows: Strong deterministic component. Smallest OD flows: Primarily dominated by spikes. Regardless of size, n-eigenflows account for a fairly constant portion. 33
34 Contribution to Each OD Flow (Abilene) Fraction of Total Energy Deterministic Spike Noise Largest OD flows: Strong deterministic component. Smallest OD flows: Dominated by noise, but have diurnal trends also OD Flow (large to small) Regardless of size, spikes account for a fairly constant portion. 34
35 Summary: Specific Questions Are there low dimensional representations for a set of OD flows? 5-10 eigenflows is sufficient for good approximation of a set of 100+ OD flows Do OD flows share common features? The common features across OD flows are eigenflows What do the features look like? Each eigenflow can be categorized as D, S, or N Can we get a high-level understanding of a set of OD flows in terms of these features? Both networks: Large flows are primarily diurnal Sprint: Small flows are primarily spikes; noise constant. Abilene: Small flows have N and D; spikes constant. 35
36 Outline Find intrinsic dimensionality of OD flows Decompose OD flows Characterize eigenflows Reconstruct OD flows Structural Analysis Potential applications 36
37 Traffic Matrix Estimation Problem Statement: Infer OD flows (X) given link measurements (Y) and routing matrix (A): Y T = AX T State of the Art: dim(x) > dim(y), so treat as ill-posed linear inverse problem. Infer Y on stationary (short) timescales. Possible Approach: On longer timescales, intrinsic dimensionality of OD flows is small, so effective dim(x) < dim(y) TM estimation of largest eigenflows now becomes a wellposed problem. 37
38 Anomaly Detection State of the art: Use wavelets to detrend each flow in isolation. [Barford:IMW02] Possible approach: Detrend all OD flows simultaneously by subtracting d-eigenflows. 3.5 x 107 Original Timeseries for OD Flow# x 106 Detrended Timeseries with 4σ threshold Original timeseries d pseudo eigenflows 5 38
39 Traffic Forecasting State of the art: Treat each flow timeseries independently. Use wavelets to extract trends. Build timeseries forecasting models on trends. [PTZC:INFOCOM03] Possible approach: Build forecasting models on d-eigenflows as trends. Allows simultaneous examination and forecasting for entire ensemble of OD flows. 39
40 Traffic Engineering Problem Statement: How does one identify important traffic flows, so that they can be treated differently? State of the art: Measure all flows on a single link Find heavy-hitters or elephant flows based on preset thresholds [PTC:INFOCOM04, PTBTSC:IMW02] Possible approach: Look across all flows and extract common features Taxonomize each flow into D, S, or N 40
41 Final thoughts OD flows a useful primitive to engineer networks Set of OD flows have low dimensional representations A Structural Analysis approach can provide useful insight into nature of OD flows 41
42 Thanks! Help with Abilene Data Rick Summerhill, Mark Fullmer (Internet2) Matthew Davy (Indiana University) Help with Sprint-Europe Data Bjorn Carlsson, Jeff Loughridge (SprintLink), Richard Gass (Sprint ATL) 42
43 Backup slides 43
44 Principal Component Analysis For any given dataset, PCA finds a new coordinate system that maps maximum variability in the data to a minimum number of coordinates New axes are called Principal Axes or Components 44
45 Properties of Principle Components Each PC in the direction of maximum (remaining) energy in the set of OD flows Ordered by amount of energy they capture mapping of X onto one PC and, difference between original and data mapped onto first k-1 PCs. Eigenflow: set of OD flows mapped onto a PC; a common trend Ordered by most common to least common trend 45
46 Energy captured by each PC Sprint 1 Abilene Energy Captured Principal Component 46
Structural Analysis of Network Traffic Flows
Structural Analysis of Network Traffic Flows Anukool Lakhina, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D. Kolaczyk, and Nina Taft ABSTRACT Network traffic arises from the superposition
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot SANOG-7, Mumbai, January, 00 Network Anomaly Diagnosis Am I being attacked? Is someone scanning
Characterization of Network-Wide Anomalies in Traffic Flows
Characterization of Network-Wide Anomalies in Traffic Flows Anukool Lakhina Dept. of Computer Science, Boston University [email protected] Mark Crovella Dept. of Computer Science, Boston University [email protected]
Diagnosing Network Disruptions with Network-Wide Analysis
Diagnosing Network Disruptions with Network-Wide Analysis Yiyi Huang, Nick Feamster, Anukool Lakhina, Jun (Jim) Xu College of Computing, Georgia Tech, Guavus, Inc. ABSTRACT To maintain high availability
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
Linear Algebra Review. Vectors
Linear Algebra Review By Tim K. Marks UCSD Borrows heavily from: Jana Kosecka [email protected] http://cs.gmu.edu/~kosecka/cs682.html Virginia de Sa Cogsci 8F Linear Algebra review UCSD Vectors The length
Machine Learning in Statistical Arbitrage
Machine Learning in Statistical Arbitrage Xing Fu, Avinash Patra December 11, 2009 Abstract We apply machine learning methods to obtain an index arbitrage strategy. In particular, we employ linear regression
Network Tomography and Internet Traffic Matrices
Network Tomography and Internet Traffic Matrices Matthew Roughan School of Mathematical Sciences 1 Credits David Donoho Stanford Nick Duffield AT&T Labs-Research Albert
Lecture 2: Descriptive Statistics and Exploratory Data Analysis
Lecture 2: Descriptive Statistics and Exploratory Data Analysis Further Thoughts on Experimental Design 16 Individuals (8 each from two populations) with replicates Pop 1 Pop 2 Randomly sample 4 individuals
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Sequential Non-Bayesian Network Traffic Flows Anomaly Detection and Isolation
Sequential Non-Bayesian Network Traffic Flows Anomaly Detection and Isolation Lionel Fillatre 1, Igor Nikiforov 1, Sandrine Vaton 2, and Pedro Casas 2 1 Institut Charles Delaunay/LM2S, FRE CNRS 2848, Université
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
Page 1. Outline EEC 274 Internet Measurements & Analysis. Traffic Measurements. Motivations. Applications
Outline EEC 274 Internet Measurements & Analysis Spring Quarter, 2006 Traffic Measurements Traffic measurements What metrics are we interested in? Measurement and analysis methodologies Traffic characterization
Impact of BGP Dynamics on Router CPU Utilization
Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal 1, Chen-Nee Chuah 2, Supratik Bhattacharyya 3, and Christophe Diot 4 1 University of California, Berkeley, USA, [email protected]
Lecture 5: Singular Value Decomposition SVD (1)
EEM3L1: Numerical and Analytical Techniques Lecture 5: Singular Value Decomposition SVD (1) EE3L1, slide 1, Version 4: 25-Sep-02 Motivation for SVD (1) SVD = Singular Value Decomposition Consider the system
An iterative tomogravity algorithm for the estimation of network traffic
IMS Lecture Notes Monograph Series Complex Datasets and Inverse Problems: Tomography, Networks and Beyond Vol. 54 (2007) 12 23 c Institute of Mathematical Statistics, 2007 DOI: 10.1214/074921707000000030
SINGULAR SPECTRUM ANALYSIS HYBRID FORECASTING METHODS WITH APPLICATION TO AIR TRANSPORT DEMAND
SINGULAR SPECTRUM ANALYSIS HYBRID FORECASTING METHODS WITH APPLICATION TO AIR TRANSPORT DEMAND K. Adjenughwure, Delft University of Technology, Transport Institute, Ph.D. candidate V. Balopoulos, Democritus
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot
Possibilities of Automation of the Caterpillar -SSA Method for Time Series Analysis and Forecast. Th.Alexandrov, N.Golyandina
Possibilities of Automation of the Caterpillar -SSA Method for Time Series Analysis and Forecast Th.Alexandrov, N.Golyandina [email protected], [email protected] St.Petersburg State University, Russia
Admin stuff. 4 Image Pyramids. Spatial Domain. Projects. Fourier domain 2/26/2008. Fourier as a change of basis
Admin stuff 4 Image Pyramids Change of office hours on Wed 4 th April Mon 3 st March 9.3.3pm (right after class) Change of time/date t of last class Currently Mon 5 th May What about Thursday 8 th May?
Singular Spectrum Analysis with Rssa
Singular Spectrum Analysis with Rssa Maurizio Sanarico Chief Data Scientist SDG Consulting Milano R June 4, 2014 Motivation Discover structural components in complex time series Working hypothesis: a signal
2.2 Elimination of Trend and Seasonality
26 CHAPTER 2. TREND AND SEASONAL COMPONENTS 2.2 Elimination of Trend and Seasonality Here we assume that the TS model is additive and there exist both trend and seasonal components, that is X t = m t +
Nonlinear Iterative Partial Least Squares Method
Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for
Principal Component Analysis
Principal Component Analysis ERS70D George Fernandez INTRODUCTION Analysis of multivariate data plays a key role in data analysis. Multivariate data consists of many different attributes or variables recorded
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic Sharad Agarwal Microsoft Research [email protected] Antonio Nucci Narus, Inc. [email protected] Supratik Bhattacharyya Sprint ATL
Linear Discrimination. Linear Discrimination. Linear Discrimination. Linearly Separable Systems Pairwise Separation. Steven J Zeil.
Steven J Zeil Old Dominion Univ. Fall 200 Discriminant-Based Classification Linearly Separable Systems Pairwise Separation 2 Posteriors 3 Logistic Discrimination 2 Discriminant-Based Classification Likelihood-based:
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
3 Orthogonal Vectors and Matrices
3 Orthogonal Vectors and Matrices The linear algebra portion of this course focuses on three matrix factorizations: QR factorization, singular valued decomposition (SVD), and LU factorization The first
Wavelet analysis. Wavelet requirements. Example signals. Stationary signal 2 Hz + 10 Hz + 20Hz. Zero mean, oscillatory (wave) Fast decay (let)
Wavelet analysis In the case of Fourier series, the orthonormal basis is generated by integral dilation of a single function e jx Every 2π-periodic square-integrable function is generated by a superposition
Data, Measurements, Features
Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are
> plot(exp.btgpllm, main = "treed GP LLM,", proj = c(1)) > plot(exp.btgpllm, main = "treed GP LLM,", proj = c(2)) quantile diff (error)
> plot(exp.btgpllm, main = "treed GP LLM,", proj = c(1)) > plot(exp.btgpllm, main = "treed GP LLM,", proj = c(2)) 0.4 0.2 0.0 0.2 0.4 treed GP LLM, mean treed GP LLM, 0.00 0.05 0.10 0.15 0.20 x1 x1 0.4
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
EE627 Lecture 22. Multihoming Route Control Devices
EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices
Time-Frequency Detection Algorithm of Network Traffic Anomalies
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies
Time Series Analysis of Network Traffic
Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace
Probability-Model based Network Traffic Matrix Estimation
Computer Science and Information Systems ():309 30 DOI: 0.98/CSIS3000T Probability-Model based Network Traffic Matrix Estimation Hui Tian, Yingpeng Sang, Hong Shen 3,4, and Chunyue Zhou School of Electronics
MUSICAL INSTRUMENT FAMILY CLASSIFICATION
MUSICAL INSTRUMENT FAMILY CLASSIFICATION Ricardo A. Garcia Media Lab, Massachusetts Institute of Technology 0 Ames Street Room E5-40, Cambridge, MA 039 USA PH: 67-53-0 FAX: 67-58-664 e-mail: rago @ media.
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,
Manifold Learning Examples PCA, LLE and ISOMAP
Manifold Learning Examples PCA, LLE and ISOMAP Dan Ventura October 14, 28 Abstract We try to give a helpful concrete example that demonstrates how to use PCA, LLE and Isomap, attempts to provide some intuition
A Primer on Mathematical Statistics and Univariate Distributions; The Normal Distribution; The GLM with the Normal Distribution
A Primer on Mathematical Statistics and Univariate Distributions; The Normal Distribution; The GLM with the Normal Distribution PSYC 943 (930): Fundamentals of Multivariate Modeling Lecture 4: September
( ) FACTORING. x In this polynomial the only variable in common to all is x.
FACTORING Factoring is similar to breaking up a number into its multiples. For example, 10=5*. The multiples are 5 and. In a polynomial it is the same way, however, the procedure is somewhat more complicated
MACHINE LEARNING IN HIGH ENERGY PHYSICS
MACHINE LEARNING IN HIGH ENERGY PHYSICS LECTURE #1 Alex Rogozhnikov, 2015 INTRO NOTES 4 days two lectures, two practice seminars every day this is introductory track to machine learning kaggle competition!
Computational Optical Imaging - Optique Numerique. -- Deconvolution --
Computational Optical Imaging - Optique Numerique -- Deconvolution -- Winter 2014 Ivo Ihrke Deconvolution Ivo Ihrke Outline Deconvolution Theory example 1D deconvolution Fourier method Algebraic method
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
1 Example of Time Series Analysis by SSA 1
1 Example of Time Series Analysis by SSA 1 Let us illustrate the 'Caterpillar'-SSA technique [1] by the example of time series analysis. Consider the time series FORT (monthly volumes of fortied wine sales
1.3 Algebraic Expressions
1.3 Algebraic Expressions A polynomial is an expression of the form: a n x n + a n 1 x n 1 +... + a 2 x 2 + a 1 x + a 0 The numbers a 1, a 2,..., a n are called coefficients. Each of the separate parts,
Traffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
Spatial Statistics Chapter 3 Basics of areal data and areal data modeling
Spatial Statistics Chapter 3 Basics of areal data and areal data modeling Recall areal data also known as lattice data are data Y (s), s D where D is a discrete index set. This usually corresponds to data
A Regime-Switching Model for Electricity Spot Prices. Gero Schindlmayr EnBW Trading GmbH [email protected]
A Regime-Switching Model for Electricity Spot Prices Gero Schindlmayr EnBW Trading GmbH [email protected] May 31, 25 A Regime-Switching Model for Electricity Spot Prices Abstract Electricity markets
CS 591.03 Introduction to Data Mining Instructor: Abdullah Mueen
CS 591.03 Introduction to Data Mining Instructor: Abdullah Mueen LECTURE 3: DATA TRANSFORMATION AND DIMENSIONALITY REDUCTION Chapter 3: Data Preprocessing Data Preprocessing: An Overview Data Quality Major
Univariate and Multivariate Methods PEARSON. Addison Wesley
Time Series Analysis Univariate and Multivariate Methods SECOND EDITION William W. S. Wei Department of Statistics The Fox School of Business and Management Temple University PEARSON Addison Wesley Boston
Unsupervised and supervised dimension reduction: Algorithms and connections
Unsupervised and supervised dimension reduction: Algorithms and connections Jieping Ye Department of Computer Science and Engineering Evolutionary Functional Genomics Center The Biodesign Institute Arizona
Joint Entropy Analysis Model for DDoS Attack Detection
2009 Fifth International Conference on Information Assurance and Security Joint Entropy Analysis Model for DDoS Attack Detection Hamza Rahmani, Nabil Sahli, Farouk Kammoun CRISTAL Lab., National School
Linear Algebraic Equations, SVD, and the Pseudo-Inverse
Linear Algebraic Equations, SVD, and the Pseudo-Inverse Philip N. Sabes October, 21 1 A Little Background 1.1 Singular values and matrix inversion For non-smmetric matrices, the eigenvalues and singular
Load Balancing by MPLS in Differentiated Services Networks
Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland
Solving Linear Systems, Continued and The Inverse of a Matrix
, Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing
CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.
Lecture Machine Learning Milos Hauskrecht [email protected] 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht [email protected] 539 Sennott
1 Introduction to Matrices
1 Introduction to Matrices In this section, important definitions and results from matrix algebra that are useful in regression analysis are introduced. While all statements below regarding the columns
Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Thomas Reilly Data Physics Corporation 1741 Technology Drive, Suite 260 San Jose, CA 95110 (408) 216-8440 This paper
W. Heath Rushing Adsurgo LLC. Harness the Power of Text Analytics: Unstructured Data Analysis for Healthcare. Session H-1 JTCC: October 23, 2015
W. Heath Rushing Adsurgo LLC Harness the Power of Text Analytics: Unstructured Data Analysis for Healthcare Session H-1 JTCC: October 23, 2015 Outline Demonstration: Recent article on cnn.com Introduction
Data Exploration and Preprocessing. Data Mining and Text Mining (UIC 583 @ Politecnico di Milano)
Data Exploration and Preprocessing Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
Gamma Distribution Fitting
Chapter 552 Gamma Distribution Fitting Introduction This module fits the gamma probability distributions to a complete or censored set of individual or grouped data values. It outputs various statistics
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Sampling Biases in IP Topology Measurements
Sampling Biases in IP Topology Measurements Anukool Lakhina with John Byers, Mark Crovella and Peng Xie Department of Boston University Discovering the Internet topology Goal: Discover the Internet Router
Common Core Unit Summary Grades 6 to 8
Common Core Unit Summary Grades 6 to 8 Grade 8: Unit 1: Congruence and Similarity- 8G1-8G5 rotations reflections and translations,( RRT=congruence) understand congruence of 2 d figures after RRT Dilations
Principles of Dat Da a t Mining Pham Tho Hoan [email protected] [email protected]. n
Principles of Data Mining Pham Tho Hoan [email protected] References [1] David Hand, Heikki Mannila and Padhraic Smyth, Principles of Data Mining, MIT press, 2002 [2] Jiawei Han and Micheline Kamber,
