Sciweavers

587 search results - page 37 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
LFP
1994
113views more  LFP 1994»
13 years 11 months ago
Collecting More Garbage
We present a method, adapted to polymorphically typed functional languages, to detect and collect more garbage than existing GCs. It can be applied to strict or lazy higher order ...
Pascal Fradet
WWW
2007
ACM
14 years 11 months ago
Exploring in the weblog space by detecting informative and affective articles
Weblogs have become a prevalent source of information for people to express themselves. In general, there are two genres of contents in weblogs. The first kind is about the weblog...
Xiaochuan Ni, Gui-Rong Xue, Xiao Ling, Yong Yu, Qi...
ESORICS
2010
Springer
13 years 10 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 5 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
CAV
2007
Springer
112views Hardware» more  CAV 2007»
14 years 4 months ago
Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures
Bounded context switch reachability analysis is a useful and efficient approach for detecting bugs in multithreaded programs. In this paper, we address the application of this app...
Ahmed Bouajjani, Séverine Fratani, Shaz Qad...