Sciweavers

703 search results - page 37 / 141
» Graph-based anomaly detection
Sort
View
GCA
2008
13 years 10 months ago
Anomaly Detection and its Application in Grid
- Size and complexity of grid computing systems increase rapidly. Failures can have adverse effect on application executing on the system. Thus, failure information should be provi...
Thuy Nguyen, Thanh Do, Dung Nguyen, Hiep Nguyen, T...
SIGMETRICS
2010
ACM
173views Hardware» more  SIGMETRICS 2010»
13 years 8 months ago
Detecting traffic anomalies using an equilibrium property
When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to ...
Fernando Silveira, Christophe Diot, Nina Taft, Ram...
BTW
2009
Springer
127views Database» more  BTW 2009»
14 years 3 months ago
In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles
: In the past couple of years, sensor networks have evolved to a powerful infrastructure component for monitoring and tracking events and phenomena in many application domains. An ...
Conny Franke, Marcel Karnstedt, Daniel Klan, Micha...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 9 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
VLDB
2007
ACM
128views Database» more  VLDB 2007»
14 years 8 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...