Sciweavers

8499 search results - page 155 / 1700
» cans 2009
Sort
View
CCS
2009
ACM
16 years 5 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
KDD
2009
ACM
347views Data Mining» more  KDD 2009»
16 years 5 months ago
Network anomaly detection based on Eigen equation compression
This paper addresses the issue of unsupervised network anomaly detection. In recent years, networks have played more and more critical roles. Since their outages cause serious eco...
Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata,...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 5 months ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...
HYBRID
2009
Springer
15 years 11 months ago
The Optimal Boundary and Regulator Design Problem for Event-Driven Controllers
Event-driven control systems provide interesting benefits such as reducing resource utilization. This paper formulates the optimal boundary and regulator design problem that minim...
Pau Martí, Manel Velasco, Enrico Bini
PAM
2009
Springer
15 years 11 months ago
Data Gathering in Optical Networks with the TL1 Toolkit
This paper describes a new tool for gathering (performance) data from optical network devices. During the last few years many National Research and Education Networks (NRENs) have ...
Ronald van der Pol, Andree Toonk