Sciweavers

912 search results - page 159 / 183
» Anomaly
Sort
View
PDPTA
2010
13 years 5 months ago
Collecting Sensor Data for High-Performance Computing: A Case-study
- Many research questions remain open with regard to improving reliability in exascale systems. Among others, statistics-based analysis has been used to find anomalies, to isolate ...
Line C. Pouchard, Jonathan D. Dobson, Stephen W. P...
ICDM
2009
IEEE
161views Data Mining» more  ICDM 2009»
13 years 5 months ago
Understanding Climate Change Patterns with Multivariate Geovisualization
Climate change has been a challenging and urgent research problem for many related research fields. Climate change trends and patterns are complex, which may involve many factors a...
Hai Jin, Diansheng Guo
CNSM
2010
13 years 4 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
CNSM
2010
13 years 2 months ago
Semantic scheduling of active measurements for meeting network monitoring objectives
Network control and management techniques (e.g., dynamic path switching, on-demand bandwidth provisioning) rely on active measurements of end-to-end network status. These measureme...
Prasad Calyam, Lakshmi Kumarasamy, Füsun &Oum...
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto