Sciweavers

912 search results - page 115 / 183
» Anomaly
Sort
View
ENGL
2007
103views more  ENGL 2007»
13 years 10 months ago
Fault Diagnosis of Manufacturing Processes via Genetic Algorithm Approach
—Instantaneous detection and diagnosis of various faults and break-downs in industrial processes is required to reduce production losses and damage to equipments. A solved knowle...
Stefania Gallova
IJCAT
2007
78views more  IJCAT 2007»
13 years 10 months ago
Enhanced SEA algorithm and fingerprint classification
: This paper proposes the Enhanced Shrinking and Expanding Algorithm (ESEA) with a new categorization method. The ESEA overcomes anomalies in the original Shrinking and Expanding A...
Li-min Liu, Ching-Yu Huang, Tian-Shyr Dai, George ...
TCSV
2008
174views more  TCSV 2008»
13 years 10 months ago
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Brendan Tran Morris, Mohan M. Trivedi
CCR
2004
80views more  CCR 2004»
13 years 10 months ago
An analysis of TCP reset behaviour on the internet
This paper presents a one-year study of Internet packet traffic from a large campus network, showing that 15-25% of TCP connections have at least one TCP RST (reset). Similar resu...
Martin F. Arlitt, Carey L. Williamson
COMPSEC
2004
91views more  COMPSEC 2004»
13 years 10 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...