Sciweavers

531 search results - page 94 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
CCECE
2009
IEEE
15 years 6 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
CONEXT
2010
ACM
14 years 9 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
NDSS
2008
IEEE
15 years 6 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
15 years 12 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
IROS
2007
IEEE
171views Robotics» more  IROS 2007»
15 years 6 months ago
Learning full-body motions from monocular vision: dynamic imitation in a humanoid robot
— In an effort to ease the burden of programming motor commands for humanoid robots, a computer vision technique is developed for converting a monocular video sequence of human p...
Jeffrey B. Cole, David B. Grimes, Rajesh P. N. Rao