Sciweavers

213 search results - page 13 / 43
» Benchmarking Anomaly-Based Detection Systems
Sort
View
OSDI
1996
ACM
13 years 8 months ago
Online Data-Race Detection via Coherency Guarantees
We present the design and evaluation of an on-thefly data-race-detection technique that handles applications written for the lazy release consistent (LRC) shared memory model. We ...
Dejan Perkovic, Peter J. Keleher
ICPADS
2002
IEEE
14 years 10 days ago
Communication Pattern Based Methodology for Performance Analysis of Termination Detection Schemes
Efficient determination of processing termination at barrier synchronization points can occupy an important role in the overall throughput of parallel and distributed computing sy...
Yili Tseng, Ronald F. DeMara
CORR
2006
Springer
152views Education» more  CORR 2006»
13 years 7 months ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle
VTC
2010
IEEE
143views Communications» more  VTC 2010»
13 years 5 months ago
Generalised Vector Precoding Design Based on the MBER Criterion for Multiuser Transmission
A generalised vector precoding (VP) design based on the minimum bit error rate (MBER) criterion is proposed for multiuser transmission in the downlink of a multiuser system where t...
Wang Yao, Sheng Chen, Lajos Hanzo
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 8 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...