23 papers:
- CASE-2015-ButtersGS #detection #network
- Detecting and reducing redundancy in alarm networks (TDB, SG, JLS), pp. 1224–1229.
- HIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix #using
- A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
- HIMI-IKC-2015-TakedaHKN #lifecycle #modelling #process
- Modelling of a Business Process for Alarm Management Lifecycle in Chemical Industries (KT, TH, NK, MN), pp. 579–587.
- HIMI-IKC-2015-WangN #analysis #identification #matrix
- Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
- ICSE-v2-2015-HerzigN #detection #empirical #using
- Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
- FM-2014-ArenisWDMA #consistency #industrial #standard #verification
- The Wireless Fire Alarm System: Ensuring Conformance to Industrial Standards through Formal Verification (SFA, BW, DD, MM, ASA), pp. 658–672.
- HIMI-HSM-2013-KimuraHTN #evaluation #performance #using
- Determination of Alarm Setpoint for Alarm System Rationalization Using Performance Evaluation (NK, TH, KT, MN), pp. 507–514.
- HIMI-HSM-2013-Noda #analysis #industrial #monitoring #performance #statistics
- Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
- ISSTA-2012-GrossFZ #search-based #testing
- Search-based system testing: high coverage, no false alarms (FG, GF, AZ), pp. 67–77.
- VMCAI-2012-LeeLY #clustering #static analysis #statistics
- Sound Non-statistical Clustering of Static Analysis Alarms (WL, WL, KY), pp. 299–314.
- CHI-2011-AmershiLKMC #named #network #performance
- CueT: human-guided fast and accurate network alarm triage (SA, BL, AK, RM, BC), pp. 157–166.
- HCI-UA-2011-FolmerPV #reduction
- An Analytical Alarm Flood Reduction to Reduce Operator’s Workload (JF, DP, BVH), pp. 297–306.
- ICEIS-HCI-2007-MotzB
- Investigations into Shipborne Alarm Management — Conduction and Results of Field Studies (FM, MAB), pp. 136–141.
- SAC-2007-MenezesMVSB
- A model for terrain coverage inspired by ant’s alarm pheromones (RM, FM, FEV, RS, MB), pp. 728–732.
- SAS-2005-JungKSY #analysis #c #statistics
- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
- SAS-2005-Rival #comprehension
- Understanding the Origin of Alarms in Astrée (XR), pp. 303–319.
- MLDM-2005-GiacintoPR #clustering #detection #network
- Alarm Clustering for Intrusion Detection Systems in Computer Networks (GG, RP, FR), pp. 184–193.
- SIGMOD-2004-CaiCPHWA #data type #mining #named
- MAIDS: Mining Alarming Incidents from Data Streams (YDC, DC, GP, JH, MW, LA), pp. 919–920.
- CSCW-2004-Randell
- Accountability in an alarming environment (RR), pp. 125–131.
- KDD-2004-DasMS
- Belief state approaches to signaling alarms in surveillance systems (KD, AWM, JGS), pp. 539–544.
- KDD-2002-JulischD #detection #mining
- Mining intrusion detection alarms for actionable knowledge (KJ, MD), pp. 366–375.
- AdaEurope-2000-Weiss #ada #java #monitoring
- Kingcat MCAS — Monitoring, Control and Alarm System for a Luxury Motor Yacht Implemented in Ada and Java (RW), pp. 2–3.
- ICEIS-2000-DiazEL #communication #network
- Expert System-Based Alarm Management in Communication Networks (SD, JIE, JL), pp. 116–120.