BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (10)
trajectori (3)
network (3)
time (3)
linear (2)

Stem anomal$ (all stems)

19 papers:

SACSAC-2015-GotoT #communication #detection #network #visual notation
Anomalous network communication detection system by visual pattern on a client computer (HG, TT), pp. 1263–1269.
CASECASE-2014-ChangYLC #behaviour #mining #towards #video
Toward mining anomalous behavior from big moving trajectories in surveillance video (CWC, MHY, CCL, KTC), pp. 1121–1126.
SIGMODSIGMOD-2014-SricharanD #graph
Localizing anomalous changes in time-evolving graphs (KS, KD), pp. 1347–1358.
KDDKDD-2014-DundarYR #identification #towards
Batch discovery of recurring rare classes toward identifying anomalous samples (MD, HZY, BR), pp. 223–232.
SIGMODSIGMOD-2012-MongioviBRSPF #mining #named #network
SigSpot: mining significant anomalous regions from time-evolving networks (abstract only) (MM, PB, RR, AKS, EEP, CF), p. 865.
ICPRICPR-2012-LiP #detection
Anomalous tie plate detection for railroad inspection (YL, SP), pp. 3017–3020.
WCREWCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
ICPRICPR-2010-GuptaD #communication #detection #network #social
Detection and Characterization of Anomalous Entities in Social Communication Networks (NG, LD), pp. 738–741.
DocEngDocEng-2009-Popat #detection
A panlingual anomalous text detector (ACP), pp. 201–204.
ICEISICEIS-AIDSS-2009-AlbusacCLVL #analysis #detection
Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
KDDKDD-2009-ShiJ #linear #statistics
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP) (LS, VPJ), pp. 767–776.
ICPRICPR-2008-KawabataHS #agile #kernel
A rapid anomalous region extraction method by iterative projection onto kernel eigenspace (SK, SH, KS), pp. 1–4.
ICPRICPR-2008-PiciarelliMF #detection
Anomalous trajectory patterns detection (CP, CM, GLF), pp. 1–4.
CASECASE-2007-KratochvilDZN #automation #metric
Automatic Nanorobotic Characterization of Anomalously Rolled-up SiGe/Si Helical Nanobelts through Vision-based Force Measurement (BK, LD, LZ, BJN), pp. 57–62.
KDDKDD-2007-DasS #category theory #dataset #detection
Detecting anomalous records in categorical datasets (KD, JGS), pp. 220–229.
ICPRICPR-v3-2006-KawabataHS #detection #realtime
Real-Time Detection of Anomalous Objects in Dynamic Scene (SK, SH, KS), pp. 1171–1174.
SACSAC-2005-JanejaA #detection #linear #named #semantics #statistics
LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows (VPJ, VA), pp. 493–497.
SIGIRSIGIR-1986-BelkinK #documentation #retrieval #using
Using Structural Representations of Anomalous States of Knowledge for Choosing Document Retrieval Strategies (NJB, BHK), pp. 11–22.
ICSEICSE-1976-FosdickO #data flow #detection #interprocedural
The Detection of Anomalous Interprocedural Data Flow (LDF, LJO), pp. 624–628.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.