Sciweavers

6318 search results - page 64 / 1264
» Data Leakage Detection
Sort
View
CORR
2008
Springer
192views Education» more  CORR 2008»
14 years 10 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 1 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
ISCA
2009
IEEE
199views Hardware» more  ISCA 2009»
15 years 6 months ago
SigRace: signature-based data race detection
Detecting data races in parallel programs is important for both software development and production-run diagnosis. Recently, there have been several proposals for hardware-assiste...
Abdullah Muzahid, Darío Suárez Graci...
ICNSC
2007
IEEE
15 years 6 months ago
Combined Support Vector Novelty Detection for Multi-channel Combustion Data
— Multi-channel combustion data, consisting of gas pressure and two combustion chamber luminosity measurements, are investigated in the prediction of combustion instability. Wave...
Lei A. Clifton, Hujun Yin, David A. Clifton, Yang ...
ASIAMS
2008
IEEE
15 years 6 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...