Sciweavers

129 search results - page 9 / 26
» Making trace monitors feasible
Sort
View
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 5 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
TMA
2012
Springer
254views Management» more  TMA 2012»
13 years 5 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...
RAID
2001
Springer
15 years 2 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
82
Voted
PERCOM
2008
ACM
15 years 10 months ago
Context-aware Battery Management for Mobile Phones
In this paper, we propose a system for contextaware battery management that warns the user when it detects that the phone battery can run out before the next charging opportunity ...
Nishkam Ravi, James Scott, Lu Han, Liviu Iftode
ICDCSW
2006
IEEE
15 years 4 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy