Sciweavers

912 search results - page 90 / 183
» Anomaly
Sort
View
AMI
2009
Springer
14 years 3 months ago
Behavior Analysis Based on Coordinates of Body Tags
This paper describes fall detection, activity recognition and the detection of anomalous gait in the Confidence project. The project aims to prolong the independence of the elderly...
Mitja Lustrek, Bostjan Kaluza, Erik Dovgan, Bogdan...
OTM
2009
Springer
14 years 3 months ago
Revisiting the Behavior of Fault and Compensation Handlers in WS-BPEL
When automating work, it is often desirable to compensate completed work by undoing the work done by one or more activities. In the context of workflow, where compensation actions...
Rania Khalaf, Dieter Roller, Frank Leymann
SGAI
2009
Springer
14 years 3 months ago
Ontology-Driven Hypothesis Generation to Explain Anomalous Patient Responses to Treatment
Within the medical domain there are clear expectations as to how a patient should respond to treatments administered. When these responses are not observed it can be challenging fo...
Laura Moss, Derek H. Sleeman, Malcolm Sim, Malcolm...
ACSAC
2008
IEEE
14 years 3 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
CISIM
2008
IEEE
14 years 3 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...