Sciweavers

1503 search results - page 38 / 301
» Detecting Anomalies in Graphs
Sort
View
BTW
2009
Springer
127views Database» more  BTW 2009»
14 years 3 months ago
In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles
: In the past couple of years, sensor networks have evolved to a powerful infrastructure component for monitoring and tracking events and phenomena in many application domains. An ...
Conny Franke, Marcel Karnstedt, Daniel Klan, Micha...
VLDB
2007
ACM
128views Database» more  VLDB 2007»
14 years 8 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
ADAEUROPE
2006
Springer
14 years 2 months ago
Static Detection of Access Anomalies in Ada95
In this paper we present data flow frameworks that are able to detect access anomalies in Ada multi-tasking programs. In particular, our approach finds all possible non-sequentia...
Bernd Burgstaller, Johann Blieberger, Robert Mitte...
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 9 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
APNOMS
2006
Springer
14 years 7 days ago
Detecting and Identifying Network Anomalies by Component Analysis
Many research works address detection and identification of network anomalies using traffic analysis. This paper considers large topologies, such as those of an ISP, with traffic a...
Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka