A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Sound Non-statistical Clustering of Static Analysis Alarms
[chapter]
2012
Lecture Notes in Computer Science
We now define abstract alarm depende Definition 1 (ϕ 1 ϕ 2 ) Given two alarms ϕ 1 and ϕ 2 , alarm ϕ 2 has abstract dependence on alarm ϕ 1 if and only if, act Alarm Dependence. ...
We now define abstract alarm depende Definition 1 (ϕ 1 ϕ 2 ) Given two alarms ϕ 1 and ϕ 2 , alarm ϕ 2 has abstract dependence on alarm ϕ 1 if and only if, act Alarm Dependence. ...
• Three clusterings are instances of the framework. • Applicable to any semantics-based static analysis • Guarantees the soundness of alarm : Φ → 2 S * , where Φ is the set of par collections of program ...
doi:10.1007/978-3-642-27940-9_20
fatcat:7nok3gq4xjbm7dpbnu6odfza2i
Effective interactive resolution of static analysis alarms
2017
Proceedings of the ACM on Programming Languages
We propose an interactive approach to resolve static analysis alarms. ...
We demonstrate the effectiveness of Ursa on a state-of-the-art static datarace analysis using a suite of 8 Java programs comprising 41-194 KLOC each. ...
In the work by Jung et al. [2005] , a statistical post-analysis is presented that computes the probability of each alarm being true. ...
doi:10.1145/3133881
dblp:journals/pacmpl/ZhangGSN17
fatcat:zsar2gzvvrehri57dim3a6wwyq
Systematic acquisition of audio classes for elevator surveillance
2005
Image and Video Communications and Processing 2005
Based on the observation that the banging audio class and non-neutral speech class are indicative of suspicous events in the elevator data set, we are able to detect all of the suspicious activities without ...
We use our time series analysis framework proposed in5 to low-level features extracted from the audio of an elevator surveillance content to perform an inlier/outlier based temporal segmentation. ...
Of the chosen audio classes, we found that the sound class for banging sound and the sound class of non-neutral speech are indicative of suspicious activity in elevators. ...
doi:10.1117/12.587814
dblp:conf/eiivcp/RadhakrishnanD05
fatcat:4xoqfxdeenas7fuzelgpybhgqa
Human activity localization via sequential change detection
2008
Proceeding of the 1st ACM international conference on Multimedia information retrieval - MIR '08
attention to video analysis, event detection, tracking and surveillance. ...
Today's rapid developments in digital media processing capabilities, and network speeds, make the dissemination of multimedia data extremely rapid and reliable, and have attracted significant research ...
For this reason, once the frames where changes occur in a video are estimated, we cluster them, to decrease the number of redundant or false alarm events. ...
doi:10.1145/1460096.1460140
dblp:conf/mir/BriassouliK08
fatcat:stbhav7ncbfvro5uqysv2fqyhu
Detecting race conditions in large programs
2001
Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering - PASTE '01
To keep the number of false alarms Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed ...
Reducing spurious warnings: Since statically detecting race conditions is undecidable in general, rccjava is incomplete by design and may produce false alarms for certain programming idioms. ...
In a previous paper [10] , we described rccjava, a static analysis tool that has successfully caught race conditions in a variety of small to medium-sized Java programs. ...
doi:10.1145/379605.379687
dblp:conf/paste/FlanaganF01
fatcat:zwlfe5swuzcarnqcmc7e4kvhlq
Speaker diarization of broadcast news in Albayzin 2010 evaluation campaign
2012
EURASIP Journal on Audio, Speech, and Music Processing
In this article, we present the evaluation results for the task of speaker diarization of broadcast news, which was part of the Albayzin 2010 evaluation campaign of language and speech technologies. ...
The evaluation data consists of a subset of the Catalan broadcast news database recorded from the 3/24 TV channel. ...
The authors would like to thank the organizers of the FALA 2010 workshop for their effort and also the participants for the help with the system descriptions. ...
doi:10.1186/1687-4722-2012-19
fatcat:wpkbmzqnajbwpnf7poi4d3qx54
The processing of biologically plausible and implausible forms in American Sign Language: evidence for perceptual tuning
2015
Language, Cognition and Neuroscience
deprivation may shape the neuronal mechanisms underlying the analysis of complex human form. ...
The data demonstrate that the perceptual tuning that underlies the discrimination of language and non-language information is not limited to spoken languages but extends to languages expressed in the visual ...
This work was conducted at the University of Maryland College, where DA and DP worked at that time. ...
doi:10.1080/23273798.2015.1100315
pmid:27135041
pmcid:PMC4849140
fatcat:u6pmgbvtwzbx3gsp5ieqabcw3m
Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration
2008
IEEE transactions on multimedia
We show that the test statistic of the chi-squared detector is equivalent to that of a robust (non-parametric) detector and that this simple algorithm performs well on indoor surveillance sequences and ...
We show that the scalar sensor error can be controlled through cluster-head checking and appropriate selection of cluster size . ...
Analysis of such attacks is generally complicated by considerations of the type of scalar sensor involved, such as temperature, sound or motion. ...
doi:10.1109/tmm.2008.922775
fatcat:xdh4a4nibrd6vpcshvu6uyean4
Software Security Static Analysis False Alerts Handling Approaches
2021
International Journal of Advanced Computer Science and Applications
False Positive Alerts (FPA), generated by Static Analyzers Tools (SAT), reduce the effectiveness of the automatic code review, letting them be underused in practice. ...
Researchers conduct a lot of tests to improve SAT accuracy while keeping FPA at a lower rate. They use different simulated and production datasets to validate their proposed methods. ...
I SEARCH KEYWORDS CATEGORIES Category Number Keywords 1 defects, bugs, faults 2 false alerts, false warnings, false alarms 3 static analysis, source code analysis, automatic static bugs detection 4 filtering ...
doi:10.14569/ijacsa.2021.0121180
fatcat:4fvjpsfemfg7hprrqg3apzr7di
Table of contents
2014
2014 International Conference on Informatics, Electronics & Vision (ICIEV)
Design and Performance Analysis of A Dual-band Microstrip Asymmetry Analysis of Breast Thermograms using BM3D Technique and Statistical Texture Features 244 A Fuzzy Neuro Approach to Identify Diarrhea ...
Detection in the Context of
Bangladesh
337
Lip Contour Extraction Based on K-means Clustering Segmentation Using Different Color
Planes
341
Analysis and improvement of Si integrated on-chip ...
Implementation of vision based intelligent home automation and security system. 436 Analysis of the local frequency spectrum for the chirp signal 439 An Review of the e-JIKEI Network: Security camera system ...
doi:10.1109/iciev.2014.6850868
fatcat:y4gdctlg3zgajc3ge3drl6itcy
Non-Invasive Detection of Vortex Street Cavitation
2017
Ingeniería y Universidad
</p><p><strong>Conclusion:</strong> A non-intrusive monitoring approach along with a statistical indicator were implemented to allow the diagnosis of such phenomena.</p> ...
It is based on the cyclostationary analysis of the airborne noise radiated by the collapsing bubbles. ...
A special expression of gratitude is conveyed to the staff of the LMH. ...
doi:10.11144/javeriana.iyu21-2.ndvs
fatcat:2vxwnjldjbft3dwklxscetd5lq
Attack Classification Schema for Smart City WSNs
2017
Sensors
We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. ...
However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s17040771
pmid:28379192
pmcid:PMC5422044
fatcat:olgdxixisjg7tbxcu6to74k7gy
Anomaly Detection in Computer Networks: A State-of-the-Art Review
2014
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
sorts of network everyday. ...
In this paper, we review and evaluate the state-of-the-art studies on the problem of anomaly detection in computer networks. ...
Another static analysis solution is depicted in [34] , were the authors aimed at utilizing statistical approach to solve the problem of malware detection using static analysis. ...
doi:10.22667/jowua.2014.12.31.029
dblp:journals/jowua/BaddarMM14
fatcat:26leecvy35awtgnot4w3hlvb7i
A Reconfigurable Model In Wireless Sensor Network for saving wild life
2014
IOSR Journal of Computer Engineering
The analysis of the FEI System could be of concernin its peculiarfactual to scholar'swaged in sensor networkarea and sensor industrialists who can optimize the communication and sensing segments of their ...
This data aggregation scheme ominously prolongs the network epoch, because it delivers statistics that is of concerntosolicitation. Itvalidates numerous aspects of this design expending simulation. ...
Now that allows a regular, non-emergency service call to clean the detector before it goes into alarm. 5. ...
doi:10.9790/0661-16416973
fatcat:hqwjwv6sijch7cw4jbapicrbry
Multisensor Wireless System for Eccentricity and Bearing Fault Detection in Induction Motors
2014
IEEE/ASME transactions on mechatronics
The faults of interest are static and dynamic air-gap eccentricity, bearing damage and their combinations. ...
The proposed wireless system can distinguish a faulty motor from a healthy motor with a probability of 99.9% of correct detection and less than 0.1% likelihood of false alarm. ...
Most work focuses on motor current signature analysis because the method is non-invasive, convenient and can yield information on a variety of faults [3] . ...
doi:10.1109/tmech.2013.2260865
fatcat:62svhngvdbgvdpwgo477hbzegu
« Previous
Showing results 1 — 15 out of 6,883 results