Sciweavers

587 search results - page 108 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
ML
2012
ACM
388views Machine Learning» more  ML 2012»
12 years 4 months ago
Statistical analysis of kernel-based least-squares density-ratio estimation
The ratio of two probability densities can be used for solving various machine learning tasks such as covariate shift adaptation (importance sampling), outlier detection (likeliho...
Takafumi Kanamori, Taiji Suzuki, Masashi Sugiyama
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
14 years 2 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
ICSM
2008
IEEE
14 years 3 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
BMCBI
2010
102views more  BMCBI 2010»
13 years 9 months ago
Missing genes in the annotation of prokaryotic genomes
Background: Protein-coding gene detection in prokaryotic genomes is considered a much simpler problem than in intron-containing eukaryotic genomes. However there have been reports...
Andrew S. Warren, Jeremy S. Archuleta, Wu-chun Fen...
CCS
2009
ACM
14 years 3 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning