Sciweavers

912 search results - page 41 / 183
» Anomaly
Sort
View
SAC
2004
ACM
14 years 2 months ago
The inheritance anomaly: ten years after
The term inheritance anomaly was coined in 1993 by Matsuoka and Yonezawa [15] to refer to the problems arising by the coexistence of inheritance and concurrency in concurrent obje...
Giuseppe Milicia, Vladimiro Sassone
EVOW
2009
Springer
14 years 19 days ago
Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks
In this paper the node-level decision unit of a self-learning anomaly detection mechanism for office monitoring with wireless sensor nodes is presented. The node-level decision uni...
Markus Wälchli, Torsten Braun
MASCOTS
2010
13 years 10 months ago
OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR Deployments
To monitor and diagnose bottlenecks on network paths used for large-scale data transfers, there is an increasing trend to deploy measurement frameworks such as perfSONAR. These dep...
Prasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok K...
ICONIP
2008
13 years 10 months ago
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
In this paper, we try to develop a machine learning-based virus email detection method. The key feature of this paper is employing Mail Header and Encoding Anomaly(MHEA) [1]. MHEA ...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
PST
2004
13 years 10 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani