Sciweavers

209 search results - page 4 / 42
» Effective Shadow Detection in Traffic Monitoring Application...
Sort
View
CONEXT
2008
ACM
13 years 10 months ago
Packet doppler: network monitoring using packet shift detection
Due to recent large-scale deployments of delay and losssensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Altho...
Tongqing Qiu, Jian Ni, Hao Wang, Nan Hua, Yang Ric...
JSAC
2006
165views more  JSAC 2006»
13 years 8 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
WSCG
2003
223views more  WSCG 2003»
13 years 10 months ago
Optimizing Parameters of a Motion Detection System by Means of a Genetic Algorithm
Visual surveillance and monitoring have aroused interest in the computer video community for many years. The main task of these applications is to identify (and track) moving targ...
Alessandro Bevilacqua
EDBT
2010
ACM
156views Database» more  EDBT 2010»
14 years 3 days ago
Pattern detector: fast detection of suspicious stream patterns for immediate reaction
Detecting emerging problems in information and manufacturing systems is the goal of monitoring tools. Good and timely detection of problematic conditions from measured indicators ...
Ira Assent, Hardy Kremer, Stephan Günnemann, ...
IPPS
2010
IEEE
13 years 6 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...