Sciweavers

726 search results - page 2 / 146
» From Anomaly Reports to Cases
Sort
View
ECRTS
2009
IEEE
13 years 3 months ago
Precise Worst-Case Execution Time Analysis for Processors with Timing Anomalies
This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner
CONEXT
2010
ACM
13 years 3 months ago
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist rese...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
INFOCOM
2010
IEEE
13 years 3 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot
MLDM
2009
Springer
13 years 11 months ago
Relational Frequent Patterns Mining for Novelty Detection from Data Streams
We face the problem of novelty detection from stream data, that is, the identification of new or unknown situations in an ordered sequence of objects which arrive on-line, at cons...
Michelangelo Ceci, Annalisa Appice, Corrado Loglis...
FLAIRS
2007
13 years 7 months ago
Generating Reports from Case-Based Knowledge Artifacts
Knowledge artifacts are units retained in repository-based knowledge management systems (KMS). When adopting cases as the representation for knowledge artifacts in KMS, one of the...
Rosina Weber, Sidath Gunawardena, Jason M. Proctor