Sciweavers

912 search results - page 59 / 183
» Anomaly
Sort
View
EDBT
2004
ACM
94views Database» more  EDBT 2004»
14 years 9 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
MOBISYS
2008
ACM
14 years 8 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
AP2PS
2009
IEEE
14 years 3 months ago
Anomaly Detection in P2P Networks Using Markov Modelling
Jesús E. Díaz-Verdejo, Gabriel Maci&...
KBSE
2009
IEEE
14 years 3 months ago
Generating Fixes from Object Behavior Anomalies
Advances in recent years have made it possible in some cases to locate a bug (the source of a failure) automatically. But debugging is also about correcting bugs. Can tools do thi...
Valentin Dallmeier, Andreas Zeller, Bertrand Meyer
NDSS
2009
IEEE
14 years 3 months ago
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
Yingbo Song, Angelos D. Keromytis, Salvatore J. St...