Sciweavers

102 search results - page 2 / 21
» Performance Analysis of Soft Computing Based Anomaly Detecto...
Sort
View
APNOMS
2006
Springer
13 years 9 months ago
Performance Analysis of an Adaptive Soft Handoff Algorithm for Mobile Cellular Systems
In this paper, an adaptive soft handoff algorithm, which dynamically calculates the threshold values for soft handoff based on the received signal strength, is proposed for mobile ...
Huamin Zhu, Kyung Sup Kwak
IMC
2009
ACM
13 years 12 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
DSN
2000
IEEE
13 years 9 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
DSN
2008
IEEE
13 years 12 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
TSP
2008
192views more  TSP 2008»
13 years 5 months ago
The Chase Family of Detection Algorithms for Multiple-Input Multiple-Output Channels
Abstract -- We introduce a new family of detectors for multipleinput multiple-output (MIMO) channels called Chase detectors because of their resemblance to the well-known Chase alg...
Deric W. Waters, John R. Barry