Sciweavers

868 search results - page 59 / 174
» Using concept analysis to detect co-change patterns
Sort
View
132
Voted
PLDI
2006
ACM
15 years 9 months ago
LOCKSMITH: context-sensitive correlation analysis for race detection
One common technique for preventing data races in multi-threaded programs is to ensure that all accesses to shared locations are consistently protected by a lock. We present a too...
Polyvios Pratikakis, Jeffrey S. Foster, Michael W....
136
Voted
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 9 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
254
Voted
AAAI
2008
15 years 6 months ago
Multimodal People Detection and Tracking in Crowded Scenes
This paper presents a novel people detection and tracking method based on a multi-modal sensor fusion approach that utilizes 2D laser range and camera data. The data points in the...
Luciano Spinello, Rudolph Triebel, Roland Siegwart
141
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 3 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
136
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 3 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi