Sciweavers

912 search results - page 102 / 183
» Anomaly
Sort
View
CONEXT
2008
ACM
13 years 10 months ago
Opportunistic use of client repeaters to improve performance of WLANs
Currently deployed IEEE 802.11 WLANs (Wi-Fi networks) share access point (AP) bandwidth on a per-packet basis. However, the various stations communicating with the AP often have d...
Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee,...
ICML
2001
IEEE
14 years 9 months ago
Bayesian approaches to failure prediction for disk drives
Hard disk drive failures are rare but are often costly. The ability to predict failures is important to consumers, drive manufacturers, and computer system manufacturers alike. In...
Greg Hamerly, Charles Elkan
WWW
2005
ACM
14 years 9 months ago
Advanced fault analysis in web service composition
Currently, fault management in Web Services orchestrating multiple suppliers relies on a local analysis, that does not span across individual services, thus limiting the effective...
Anna Goy, Claudia Picardi, Daniele Theseider Dupr&...
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
14 years 9 months ago
Online novelty detection on temporal sequences
: Novelty detection, or anomaly detection, on temporal sequences has increasingly attracted attention from researchers in different areas. In this paper, we present a new framework...
Junshui Ma, Simon Perkins
KDD
2001
ACM
1203views Data Mining» more  KDD 2001»
14 years 9 months ago
Application of Data Mining Techniques for Medical Image Classification
Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents some experiments for tumou...
Maria-Luiza Antonie, Osmar R. Zaïane, Alexand...