Sciweavers

912 search results - page 41 / 183
» Anomaly
Sort
View
114
Voted
SAC
2004
ACM
15 years 8 months ago
The inheritance anomaly: ten years after
The term inheritance anomaly was coined in 1993 by Matsuoka and Yonezawa [15] to refer to the problems arising by the coexistence of inheritance and concurrency in concurrent obje...
Giuseppe Milicia, Vladimiro Sassone
116
Voted
EVOW
2009
Springer
15 years 6 months ago
Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks
In this paper the node-level decision unit of a self-learning anomaly detection mechanism for office monitoring with wireless sensor nodes is presented. The node-level decision uni...
Markus Wälchli, Torsten Braun
135
Voted
MASCOTS
2010
15 years 4 months ago
OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR Deployments
To monitor and diagnose bottlenecks on network paths used for large-scale data transfers, there is an increasing trend to deploy measurement frameworks such as perfSONAR. These dep...
Prasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok K...
106
Voted
ICONIP
2008
15 years 4 months ago
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
In this paper, we try to develop a machine learning-based virus email detection method. The key feature of this paper is employing Mail Header and Encoding Anomaly(MHEA) [1]. MHEA ...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
133
Voted
PST
2004
15 years 4 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani