Sciweavers

132 search results - page 6 / 27
» Anomaly detection in data represented as graphs
Sort
View
CVPR
2010
IEEE
14 years 4 months ago
Chaotic Invariants of Lagrangian Particle Trajectories for Anomaly Detection in Crowded Scenes
A novel method for crowd flow modeling and anomaly detection is proposed for both coherent and incoherent scenes. The novelty is revealed in three aspects. First, it is a unique ut...
Shandong Wu, Brian E. Moore, and Mubarak Shah
JSAC
2006
165views more  JSAC 2006»
13 years 8 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
VLDB
2007
ACM
179views Database» more  VLDB 2007»
14 years 8 months ago
Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data
Market analysis is a representative data analysis process with many applications. In such an analysis, critical numerical measures, such as profit and sales, fluctuate over time a...
Xiaolei Li, Jiawei Han
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
14 years 15 days ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
MICRO
2009
IEEE
132views Hardware» more  MICRO 2009»
14 years 3 months ago
Finding concurrency bugs with context-aware communication graphs
Incorrect thread synchronization often leads to concurrency bugs that manifest nondeterministically and are difficult to detect and fix. Past work on detecting concurrency bugs ...
Brandon Lucia, Luis Ceze