Sciweavers

587 search results - page 66 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 10 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
CHI
2011
ACM
13 years 1 months ago
LifeFlow: visualizing an overview of event sequences
Event sequence analysis is an important task in many domains: medical researchers may study the patterns of transfers within the hospital for quality control; transportation exper...
Krist Wongsuphasawat, John Alexis Guerra Gó...
CCS
2010
ACM
13 years 10 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
PLDI
2006
ACM
14 years 4 months ago
Free-Me: a static analysis for automatic individual object reclamation
Garbage collection has proven benefits, including fewer memoryrelated errors and reduced programmer effort. Garbage collection, however, trades space for time. It reclaims memory...
Samuel Z. Guyer, Kathryn S. McKinley, Daniel Framp...