Sciweavers

912 search results - page 139 / 183
» Anomaly
Sort
View
CEEMAS
2005
Springer
14 years 2 months ago
Diagnosis of Plans and Agents
Abstract. We discuss the application of Model-Based Diagnosis in (agentbased) planning. Here, a plan together with its executing agent is considered as a system to be diagnosed. It...
Nico Roos, Cees Witteveen
FPL
2005
Springer
119views Hardware» more  FPL 2005»
14 years 2 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
GECCO
2005
Springer
151views Optimization» more  GECCO 2005»
14 years 2 months ago
The application of antigenic search techniques to time series forecasting
Time series have been a major topic of interest and analysis for hundreds of years, with forecasting a central problem. A large body of analysis techniques has been developed, par...
Ian Nunn, Tony White
ICCSA
2005
Springer
14 years 2 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das
ISMIS
2005
Springer
14 years 2 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni