Sciweavers

587 search results - page 20 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
PLDI
2010
ACM
14 years 2 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
APVIS
2010
13 years 12 months ago
Stack zooming for multi-focus interaction in time-series data visualization
Information visualization shows tremendous potential for helping both expert and casual users alike make sense of temporal data, but current time series visualization tools provid...
Waqas Javed, Niklas Elmqvist
IPPS
2007
IEEE
14 years 4 months ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
CW
2003
IEEE
14 years 3 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 11 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...