Sciweavers

912 search results - page 61 / 183
» Anomaly
Sort
View
91
Voted
IMC
2009
ACM
15 years 9 months ago
Anomaly extraction in backbone networks using association rules
Daniela Brauckhoff, Xenofontas A. Dimitropoulos, A...
118
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li, Hyundo Park, Debin Gao, Jianming Fu
122
Voted
CISS
2008
IEEE
15 years 9 months ago
Unsupervised distributional anomaly detection for a self-diagnostic speech activity detector
— One feature that classification algorithms typically lack is the ability to know what they do not know. With this knowledge an algorithm would be able to operate in any domain...
Nash M. Borges, Gerard G. L. Meyer
81
Voted
CVPR
2008
IEEE
15 years 9 months ago
Learning object motion patterns for anomaly detection and improved object detection
Arslan Basharat, Alexei Gritai, Mubarak Shah
74
Voted
ICEIS
2008
IEEE
15 years 9 months ago
Bayesian-Networks-Based Misuse and Anomaly Prevention System
Pablo Garcia Bringas, Yoseba K. Penya, Stefano Par...