Sciweavers

255 search results - page 18 / 51
» Timing Anomalies Reloaded
Sort
View
PST
2004
15 years 1 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
CVPR
2009
IEEE
16 years 7 months ago
Anomaly Detection in Extremely Crowded Scenes using Spatio-Temporal Motion Pattern Models
Extremely crowded scenes present unique challenges to video analysis that cannot be addressed with conventional approaches. We present a novel statistical framework for modeling...
Louis Kratz (Drexel University), Ko Nishino (Drexe...
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
14 years 10 months ago
Detecting anomalies in unmanned vehicles using the Mahalanobis distance
The use of unmanned autonomous vehicles is becoming more and more significant in recent years. The fact that the vehicles are unmanned (whether autonomous or not), can lead to gre...
Raz Lin, Eliahu Khalastchi, Gal A. Kaminka
SIGMOD
2004
ACM
103views Database» more  SIGMOD 2004»
15 years 12 months ago
A Read-Only Transaction Anomaly Under Snapshot Isolation
Snapshot Isolation (SI), is a multi-version concurrency control algorithm introduced in [BBGMOO95] and later implemented by Oracle. SI avoids many concurrency errors, and it never ...
Alan Fekete, Elizabeth J. O'Neil, Patrick E. O'Nei...
RAID
2004
Springer
15 years 5 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...