Sciweavers

912 search results - page 154 / 183
» Anomaly
Sort
View
FGCS
2006
61views more  FGCS 2006»
13 years 8 months ago
Long-range static directional stress transfer in a cracked, nonlinear elastic crust
Seeing the Earth crust as criss-crossed by faults filled with fluid at close to lithostatic pressures, we develop a model in which its elastic modulii are different in net tension...
Guy Ouillon, Didier Sornette
CN
2007
106views more  CN 2007»
13 years 8 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
IJISEC
2006
119views more  IJISEC 2006»
13 years 8 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
CORR
2007
Springer
132views Education» more  CORR 2007»
13 years 8 months ago
Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals
Data analysis applications typically aggregate data across many dimensions looking for anomalies or unusual patterns. The SQL aggregate functions and the GROUP BY operator produce ...
Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew...
JUCS
2006
146views more  JUCS 2006»
13 years 8 months ago
Health Monitoring and Assistance to Support Aging in Place
: To many people, home is a sanctuary. For those people who need special medical care, they may need to be pulled out of their home to meet their medical needs. As the population a...
Diane J. Cook