Sciweavers

912 search results - page 128 / 183
» Anomaly
Sort
View
EUROMICRO
2009
IEEE
14 years 3 months ago
Using Design Patterns for Refactoring Real-World Models
— Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, ...
Hamed Yaghoubi Shahir, Ehsan Kouroshfar, Raman Ram...
ICAS
2009
IEEE
139views Robotics» more  ICAS 2009»
14 years 3 months ago
Predicting Web Server Crashes: A Case Study in Comparing Prediction Algorithms
Abstract—Traditionally, performance has been the most important metrics when evaluating a system. However, in the last decades industry and academia have been paying increasing a...
Javier Alonso, Jordi Torres, Ricard Gavaldà
ICIW
2009
IEEE
14 years 3 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
ICNP
2009
IEEE
14 years 3 months ago
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
—Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, ...
Alexander W. Min, Kang G. Shin, Xin Hu
ICST
2009
IEEE
14 years 3 months ago
A Model Building Process for Identifying Actionable Static Analysis Alerts
Automated static analysis can identify potential source code anomalies early in the software process that could lead to field failures. However, only a small portion of static ana...
Sarah Smith Heckman, Laurie A. Williams