Sciweavers

587 search results - page 108 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
152
Voted
ML
2012
ACM
388views Machine Learning» more  ML 2012»
13 years 9 months ago
Statistical analysis of kernel-based least-squares density-ratio estimation
The ratio of two probability densities can be used for solving various machine learning tasks such as covariate shift adaptation (importance sampling), outlier detection (likeliho...
Takafumi Kanamori, Taiji Suzuki, Masashi Sugiyama
100
Voted
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
15 years 7 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
105
Voted
ICSM
2008
IEEE
15 years 8 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
110
Voted
BMCBI
2010
102views more  BMCBI 2010»
15 years 2 months ago
Missing genes in the annotation of prokaryotic genomes
Background: Protein-coding gene detection in prokaryotic genomes is considered a much simpler problem than in intron-containing eukaryotic genomes. However there have been reports...
Andrew S. Warren, Jeremy S. Archuleta, Wu-chun Fen...
123
Voted
CCS
2009
ACM
15 years 9 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning