Sciweavers

117 search results - page 16 / 24
» A hybrid approach to operating system discovery based on dia...
Sort
View
SIGCOMM
2010
ACM
14 years 9 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
14 years 8 months ago
Detecting anomalies in unmanned vehicles using the Mahalanobis distance
The use of unmanned autonomous vehicles is becoming more and more significant in recent years. The fact that the vehicles are unmanned (whether autonomous or not), can lead to gre...
Raz Lin, Eliahu Khalastchi, Gal A. Kaminka
ECAI
2008
Springer
14 years 11 months ago
Intelligent adaptive monitoring for cardiac surveillance
Monitoring patients in intensive care units is a critical task. Simple condition detection is generally insufficient to diagnose a patient and may generate many false alarms to the...
Lucie Callens, Guy Carrault, Marie-Odile Cordier, ...
DKE
2002
218views more  DKE 2002»
14 years 9 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
ISICA
2009
Springer
15 years 4 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong