Sciweavers

765 search results - page 150 / 153
» Detecting Anomalies and Intruders
Sort
View
IROS
2007
IEEE
254views Robotics» more  IROS 2007»
14 years 1 months ago
3D datasets segmentation based on local attribute variation
— We present a Graph-based method for low-level segmentation of unfiltered 3D data. The core of this approach is based on the construction of a local neighborhood structure and ...
Carla Silva Rocha Aguiar, Sébastien Druon, ...
RTSS
2005
IEEE
14 years 28 days ago
Enhanced EDF Scheduling Algorithms for Orchestrating Network-Wide Active Measurements
Monitoring network status such as end-to-end delay, jitter, and available bandwidth is important to support QoS-sensitive applications and timely detection of network anomalies li...
Prasad Calyam, Chang-Gun Lee, Phani Kumar Arava, D...
SIGMETRICS
2005
ACM
102views Hardware» more  SIGMETRICS 2005»
14 years 27 days ago
A statistical framework for efficient monitoring of end-to-end network properties
Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide measures ...
David B. Chua, Eric D. Kolaczyk, Mark Crovella
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
14 years 27 days ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
VLDB
2005
ACM
196views Database» more  VLDB 2005»
14 years 25 days ago
Summarizing and Mining Inverse Distributions on Data Streams via Dynamic Inverse Sampling
Emerging data stream management systems approach the challenge of massive data distributions which arrive at high speeds while there is only small storage by summarizing and minin...
Graham Cormode, S. Muthukrishnan, Irina Rozenbaum