Sciweavers

912 search results - page 104 / 183
» Anomaly
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Information Theoretic Approach to Signal Feature Detection for Cognitive Radio
—Cognitive radio (CR) systems need to be able to adjust the transceiver characteristics in response to stimuli received from the radio environment. Therefore, monitoring the wire...
Mostafa Z. Afgani, Sinan Sinanovic, Harald Haas
ICDM
2008
IEEE
117views Data Mining» more  ICDM 2008»
14 years 3 months ago
RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs
How do real, weighted graphs change over time? What patterns, if any, do they obey? Earlier studies focus on unweighted graphs, and, with few exceptions, they focus on static snap...
Leman Akoglu, Mary McGlohon, Christos Faloutsos
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
14 years 3 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley
IAT
2007
IEEE
14 years 3 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
ICDM
2007
IEEE
196views Data Mining» more  ICDM 2007»
14 years 3 months ago
Diagnosing Similarity of Oscillation Trends in Time Series
Sensor networks have increased the amount and variety of temporal data available, requiring the definition of new techniques for data mining. Related research typically addresses...
Leonardo E. Mariote, Claudia Bauzer Medeiros, Rica...