Results 301 to 310 of about 307,816 (329)
Some of the next articles are maybe not open access.

Detection of Anomalies in Diaphragm Walls

2015
If a calamity with a retaining wall occurs, the impact on surrounding buildings and infrastructure is at least an order of magnitude more severe than without the calamity. In 2005 and 2006 major leaks in the retaining walls of underground stations in Amsterdam and Rotterdam occurred.
Spruit, R. (author)   +2 more
openaire   +3 more sources

On-the-fly detection of access anomalies

ACM SIGPLAN Notices, 1989
Access anomalies are a common class of bugs in shared-memory parallel programs. An access anomaly occurs when two concurrent execution threads both write (or one thread reads and the other writes) the same shared memory location without coordination.
openaire   +3 more sources

Anomaly detection in trajectories

2016 24th Signal Processing and Communication Application Conference (SIU), 2016
In this work, we study the problem of anomaly detection of the trajectories of objects in a visual scene. For this purpose, we propose a novel representation for trajectories utilizing covariance features. Representing trajectories via co-variance features enables us to calculate the distance between the trajectories of different lengths. After setting
Hamza Ergezer, Kemal Leblebicioglu
openaire   +2 more sources

Detection of Disturbances and Anomalies

2017
Reactor operators have to judge the state of the reactor. In the operator room they see the panels displaying data on the state of the reactor and decide on the action to be taken to operate safely and economically. A reactor surveillance system is complex enough to encounter errors, failures, or malfunctions.
János Végh, Mihály Makai
openaire   +2 more sources

Anomaly Detection

2014
This chapter presents an extension of conformal prediction for anomaly detection applications. It includes the presentation and discussion of the Conformal Anomaly Detector (CAD) and the computationally more efficient Inductive Conformal Anomaly Detector (ICAD), which are general algorithms for unsupervised or semi-supervised and offline or online ...
openaire   +2 more sources

Anomaly detection for diagnosis

[1990] Digest of Papers. Fault-Tolerant Computing: 20th International Symposium, 2002
The author presents a method for detecting anomalous events in communication networks and other similarly characterized environments in which performance anomalies are indicative of failure. The methodology, based on automatically learning the difference between normal and abnormal behavior, has been implemented as part of an automated diagnosis system
openaire   +2 more sources

Detecting motion anomalies

Proceedings of the 8th ACM SIGSPATIAL Workshop on GeoStreaming, 2017
An unsupervised methodology is presented for the detection of motion anomalies using spatial context and multivariate statistical tests. The method is applied to GPS data captured for a taxi fleet in Porto, Portugal; and, AIS data captured for ships operating in the Aegean Sea.
openaire   +2 more sources

Deep Learning for Anomaly Detection

ACM Computing Surveys, 2022
Guansong Pang, Longbing Cao
exaly  

Deep Learning for Medical Anomaly Detection – A Survey

ACM Computing Surveys, 2022
Tharindu Fernando   +2 more
exaly  

Deep Learning-based Anomaly Detection in Cyber-physical Systems

ACM Computing Surveys, 2022
Yuan Luo, Guojun Peng
exaly  

Home - About - Disclaimer - Privacy