Sciweavers

912 search results - page 41 / 183
» Anomaly
Sort
View
112
Voted
SAC
2004
ACM
15 years 8 months ago
The inheritance anomaly: ten years after
The term inheritance anomaly was coined in 1993 by Matsuoka and Yonezawa [15] to refer to the problems arising by the coexistence of inheritance and concurrency in concurrent obje...
Giuseppe Milicia, Vladimiro Sassone
EVOW
2009
Springer
15 years 6 months ago
Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks
In this paper the node-level decision unit of a self-learning anomaly detection mechanism for office monitoring with wireless sensor nodes is presented. The node-level decision uni...
Markus Wälchli, Torsten Braun
134
Voted
MASCOTS
2010
15 years 4 months ago
OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR Deployments
To monitor and diagnose bottlenecks on network paths used for large-scale data transfers, there is an increasing trend to deploy measurement frameworks such as perfSONAR. These dep...
Prasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok K...
ICONIP
2008
15 years 4 months ago
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
In this paper, we try to develop a machine learning-based virus email detection method. The key feature of this paper is employing Mail Header and Encoding Anomaly(MHEA) [1]. MHEA ...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
131
Voted
PST
2004
15 years 3 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani