Sciweavers

201 search results - page 31 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
CONCUR
2000
Springer
15 years 2 months ago
Reachability Analysis for Some Models of Infinite-State Transition Systems
We introduce some new models of infinite-state transition systems. The basic model, called a (reversal-bounded) counter machine (CM), is a nondeterministic finite automaton augment...
Oscar H. Ibarra, Tevfik Bultan, Jianwen Su
ICRA
2009
IEEE
162views Robotics» more  ICRA 2009»
15 years 5 months ago
Distributed sensor analysis for fault detection in tightly-coupled multi-robot team tasks
— This paper presents a distributed version of our previous work, called SAFDetection, which is a sensor analysisbased fault detection approach that is used to monitor tightlycou...
Xingyan Li, Lynne E. Parker
BMCBI
2005
161views more  BMCBI 2005»
14 years 11 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 3 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 5 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...