Sciweavers

587 search results - page 20 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
120
Voted
PLDI
2010
ACM
15 years 4 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
95
Voted
APVIS
2010
15 years 1 months ago
Stack zooming for multi-focus interaction in time-series data visualization
Information visualization shows tremendous potential for helping both expert and casual users alike make sense of temporal data, but current time series visualization tools provid...
Waqas Javed, Niklas Elmqvist
101
Voted
IPPS
2007
IEEE
15 years 6 months ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
CW
2003
IEEE
15 years 5 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 29 days ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...