Results 301 to 310 of about 307,816 (329)
Some of the next articles are maybe not open access.
Detection of Anomalies in Diaphragm Walls
2015If a calamity with a retaining wall occurs, the impact on surrounding buildings and infrastructure is at least an order of magnitude more severe than without the calamity. In 2005 and 2006 major leaks in the retaining walls of underground stations in Amsterdam and Rotterdam occurred.
Spruit, R. (author)+2 more
openaire +3 more sources
On-the-fly detection of access anomalies
ACM SIGPLAN Notices, 1989Access anomalies are a common class of bugs in shared-memory parallel programs. An access anomaly occurs when two concurrent execution threads both write (or one thread reads and the other writes) the same shared memory location without coordination.
openaire +3 more sources
Anomaly detection in trajectories
2016 24th Signal Processing and Communication Application Conference (SIU), 2016In this work, we study the problem of anomaly detection of the trajectories of objects in a visual scene. For this purpose, we propose a novel representation for trajectories utilizing covariance features. Representing trajectories via co-variance features enables us to calculate the distance between the trajectories of different lengths. After setting
Hamza Ergezer, Kemal Leblebicioglu
openaire +2 more sources
Detection of Disturbances and Anomalies
2017Reactor operators have to judge the state of the reactor. In the operator room they see the panels displaying data on the state of the reactor and decide on the action to be taken to operate safely and economically. A reactor surveillance system is complex enough to encounter errors, failures, or malfunctions.
János Végh, Mihály Makai
openaire +2 more sources
2014
This chapter presents an extension of conformal prediction for anomaly detection applications. It includes the presentation and discussion of the Conformal Anomaly Detector (CAD) and the computationally more efficient Inductive Conformal Anomaly Detector (ICAD), which are general algorithms for unsupervised or semi-supervised and offline or online ...
openaire +2 more sources
This chapter presents an extension of conformal prediction for anomaly detection applications. It includes the presentation and discussion of the Conformal Anomaly Detector (CAD) and the computationally more efficient Inductive Conformal Anomaly Detector (ICAD), which are general algorithms for unsupervised or semi-supervised and offline or online ...
openaire +2 more sources
Anomaly detection for diagnosis
[1990] Digest of Papers. Fault-Tolerant Computing: 20th International Symposium, 2002The author presents a method for detecting anomalous events in communication networks and other similarly characterized environments in which performance anomalies are indicative of failure. The methodology, based on automatically learning the difference between normal and abnormal behavior, has been implemented as part of an automated diagnosis system
openaire +2 more sources
Proceedings of the 8th ACM SIGSPATIAL Workshop on GeoStreaming, 2017
An unsupervised methodology is presented for the detection of motion anomalies using spatial context and multivariate statistical tests. The method is applied to GPS data captured for a taxi fleet in Porto, Portugal; and, AIS data captured for ships operating in the Aegean Sea.
openaire +2 more sources
An unsupervised methodology is presented for the detection of motion anomalies using spatial context and multivariate statistical tests. The method is applied to GPS data captured for a taxi fleet in Porto, Portugal; and, AIS data captured for ships operating in the Aegean Sea.
openaire +2 more sources
Deep Learning for Medical Anomaly Detection – A Survey
ACM Computing Surveys, 2022Tharindu Fernando+2 more
exaly
Deep Learning-based Anomaly Detection in Cyber-physical Systems
ACM Computing Surveys, 2022Yuan Luo, Guojun Peng
exaly