Sciweavers

61 search results - page 7 / 13
» Aberrant Behavior Detection in Time Series for Network Monit...
Sort
View
MINENET
2005
ACM
14 years 1 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
MOBIHOC
2010
ACM
13 years 5 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
GECCO
2006
Springer
178views Optimization» more  GECCO 2006»
13 years 11 months ago
A dynamic approach to artificial immune systems utilizing neural networks
The purpose of this work is to propose an immune-inspired setup to use a self-organizing map as a computational model for the interaction of antigens and antibodies. The proposed ...
Stefan Schadwinkel, Werner Dilger
DCOSS
2007
Springer
14 years 1 months ago
Mobile Anchor-Free Localization for Wireless Sensor Networks
Localization is a fundamental problem in wireless sensor networks. In this paper, we consider how to localize individual nodes in a wireless sensor network when some subset of the...
Yurong Xu, Yi Ouyang, Zhengyi Le, James Ford, Fill...
DSN
2008
IEEE
14 years 1 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...