메뉴 건너뛰기




Volumn 2506, Issue , 2002, Pages 169-180

Two dimensional time-series for anomaly detection and regulation in adaptive systems

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA COMPRESSION; DIGITAL STORAGE; ELECTRONIC COMMERCE; ITERATIVE METHODS; TIME SERIES;

EID: 84959039793     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36110-3_17     Document Type: Conference Paper
Times cited : (27)

References (20)
  • 4
    • 0032294044 scopus 로고    scopus 로고
    • Automated system administration with feedback regulation
    • M. Burgess. Automated system administration with feedback regulation. Software practice and experience, 28:1519, 1998.
    • (1998) Software Practice and Experience , vol.28 , pp. 1519
    • Burgess, M.1
  • 12
    • 85084164220 scopus 로고
    • Computer system performance problem detection using time series models
    • (USENIX Association: Berkeley, CA)
    • P. Hoogenboom and J. Lepreau. Computer system performance problem detection using time series models. Proceedings of the USENIX TechnicalConfer ence, (USENIX Association: Berkeley, CA), page 15, 1993.
    • (1993) Proceedings of the USENIX Technicalconfer Ence , pp. 15
    • Hoogenboom, P.1    Lepreau, J.2
  • 13
    • 84959059188 scopus 로고    scopus 로고
    • Cfengine www site
    • M. Burgess. Cfengine www site. http://www.iu.hio.no/cfengine.
    • Burgess, M.1
  • 15
    • 1642388558 scopus 로고    scopus 로고
    • Adaptive locks for frequently scheduled tasks with unpredictable runtimes
    • (LISA XI) (USENIX Association: Berkeley, CA)
    • M. Burgess and D. Skipitaris. Adaptive locks for frequently scheduled tasks with unpredictable runtimes. Proceedings of the Eleventh Systems Administration Conference (LISA XI) (USENIX Association: Berkeley, CA), page 113, 1997.
    • (1997) Proceedings of the Eleventh Systems Administration Conference , pp. 113
    • Burgess, M.1    Skipitaris, D.2
  • 16
    • 84959059150 scopus 로고    scopus 로고
    • A comparison of methods for implementing adaptive security policies
    • (USENIX Association: Berkeley, CA)
    • M. Carney and B. Loe. A comparison of methods for implementing adaptive security policies. Proceedings of the 7th security conference (USENIX Association: Berkeley, CA).
    • Proceedings of the 7Th Security Conference
    • Carney, M.1    Loe, B.2
  • 18
    • 84976223999 scopus 로고    scopus 로고
    • Sleepcat Berkeley db project. http://www.sleepycat.com.
  • 19
    • 0442283022 scopus 로고    scopus 로고
    • The kinematics of distributed computer transactions
    • M. Burgess. The kinematics of distributed computer transactions. International Journalof Modern Physics, C12:759-789, 2000.
    • (2000) International Journalof Modern Physics , vol.C12 , pp. 759-789
    • Burgess, M.1
  • 20
    • 84976245614 scopus 로고    scopus 로고
    • Snort. Intrusion detection system. http://www.snort.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.