Sciweavers

912 search results - page 76 / 183
» Anomaly
Sort
View
149
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
151
Voted
CVPR
2012
IEEE
13 years 5 months ago
Video anomaly detection based on local statistical aggregates
Venkatesh Saligrama, Zhu Chen
269
Voted
SPIN
2012
Springer
13 years 5 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
122
Voted
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
15 years 9 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
136
Voted
CIKM
2008
Springer
15 years 4 months ago
Fast mining of complex time-stamped events
Given a collection of complex, time-stamped events, how do we find patterns and anomalies? Events could be meetings with one or more persons with one or more agenda items at zero ...
Hanghang Tong, Yasushi Sakurai, Tina Eliassi-Rad, ...