Sciweavers

834 search results - page 142 / 167
» Analyzing Harmonic Monitoring Data Using Data Mining
Sort
View
TMA
2010
Springer
314views Management» more  TMA 2010»
15 years 4 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
ECOOP
2003
Springer
15 years 2 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
81
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
VLDB
2001
ACM
100views Database» more  VLDB 2001»
15 years 2 months ago
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Business process automation technologies are being increasingly used by many companies to improve the efficiency of both internal processes as well as of e-services offered to cus...
Daniela Grigori, Fabio Casati, Umeshwar Dayal, Min...
SAC
2011
ACM
14 years 13 days ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty