Sciweavers

1291 search results - page 168 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ICANNGA
2009
Springer
134views Algorithms» more  ICANNGA 2009»
14 years 3 months ago
A Generative Model for Self/Non-self Discrimination in Strings
A statistical generative model is presented as an alternative to negative selection in anomaly detection of string data. We extend the probabilistic approach to binary classificat...
Matti Pöllä
PDP
2007
IEEE
14 years 3 months ago
Monitoring and Analysis Framework for Grid Middleware
As the use of complex grid middleware becomes widespread and more facilites are offered by these pieces of software, distributed Grid applications are becoming more and more popul...
Ramon Nou, Ferran Julià, David Carrera, Kev...
RAS
2007
148views more  RAS 2007»
13 years 8 months ago
Including probabilistic target detection attributes into map representations
Range measuring sensors can play an extremely important role in robot navigation. All range measuring devices rely on a ‘detection criterion’ made in the presence of noise, to...
John Mullane, Ebi Jose, Martin David Adams, Wijeru...
SIGSOFT
2005
ACM
14 years 2 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
SIGSOFT
2007
ACM
14 years 9 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno