Sciweavers

912 search results - page 26 / 183
» Anomaly
Sort
View
ICCSA
2009
Springer
15 years 9 months ago
Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol
IEEE 802.11 Distributed Coordination Function (DCF) guarantees fair transmission opportunity to stations. Channel occupation of low rate stations in IEEE 802.11 Wireless Local Area...
Jin-Seong Kim, Tae-Jin Lee
144
Voted
IWPC
2000
IEEE
15 years 9 months ago
Architectural Repair of Open Source Software
As a software system evolves, its architecture will drift. System changes are often done without considering their effects on the system structure. These changes often introduce s...
John B. Tran, Michael W. Godfrey, Eric H. S. Lee, ...
168
Voted
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 9 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
15 years 6 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
ISBI
2008
IEEE
16 years 5 months ago
Distributed online anomaly detection in high-content screening
This paper presents an automated, online approach to anomaly detection in high-content screening assays for pharmaceutical research. Online detection of anomalies is attractive be...
Adam Goode, Rahul Sukthankar, Lily B. Mummert, Mei...