Sciweavers

102 search results - page 4 / 21
» Performance Analysis of Soft Computing Based Anomaly Detecto...
Sort
View
ICC
2008
IEEE
120views Communications» more  ICC 2008»
15 years 4 months ago
Near-Optimum Soft-Output Ant-Colony-Optimization Based Multiuser Detection for the DS-CDMA Uplink
— In this contribution, a novel soft-output Ant Colony Optimization (ACO) based Multi-User Detector (MUD) is proposed for the synchronous Direct-Sequence Code-DivisionMultiple-Ac...
Chong Xu, Lie-Liang Yang, Robert G. Maunder, Lajos...
87
Voted
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
15 years 1 months ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
ASPLOS
2006
ACM
15 years 3 months ago
HeapMD: identifying heap-based bugs using anomaly detection
We present the design, implementation, and evaluation of HeapMD, a dynamic analysis tool that finds heap-based bugs using anomaly detection. HeapMD is based upon the observation ...
Trishul M. Chilimbi, Vinod Ganapathy
ICARIS
2009
Springer
15 years 4 months ago
Exploration of the Dendritic Cell Algorithm Using the Duration Calculus
As one of the newest members in Artificial Immune Systems (AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to th...
Feng Gu, Julie Greensmith, Uwe Aickelin
DSOM
2003
Springer
15 years 2 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...