Filters








7,281 Hits in 4.6 sec

Sound Non-statistical Clustering of Static Analysis Alarms [chapter]

Woosuk Lee, Wonchan Lee, Kwangkeun Yi
2012 Lecture Notes in Computer Science  
We now define abstract alarm depende Definition 1 (ϕ 1 ϕ 2 ) Given two alarms ϕ 1 and ϕ 2 , alarm ϕ 2 has abstract dependence on alarm ϕ 1 if and only if, act Alarm Dependence.  ...  We now define abstract alarm depende Definition 1 (ϕ 1 ϕ 2 ) Given two alarms ϕ 1 and ϕ 2 , alarm ϕ 2 has abstract dependence on alarm ϕ 1 if and only if, act Alarm Dependence.  ...  • Three clusterings are instances of the framework. • Applicable to any semantics-based static analysis • Guarantees the soundness of alarm : Φ → 2 S * , where Φ is the set of par collections of program  ... 
doi:10.1007/978-3-642-27940-9_20 fatcat:7nok3gq4xjbm7dpbnu6odfza2i

Effective interactive resolution of static analysis alarms

Xin Zhang, Radu Grigore, Xujie Si, Mayur Naik
2017 Proceedings of the ACM on Programming Languages  
We propose an interactive approach to resolve static analysis alarms.  ...  We demonstrate the effectiveness of Ursa on a state-of-the-art static datarace analysis using a suite of 8 Java programs comprising 41-194 KLOC each.  ...  In the work by Jung et al. [2005] , a statistical post-analysis is presented that computes the probability of each alarm being true.  ... 
doi:10.1145/3133881 dblp:journals/pacmpl/ZhangGSN17 fatcat:zsar2gzvvrehri57dim3a6wwyq

The impact of wearable continuous vital sign monitoring on deterioration detection and clinical outcomes in hospitalised patients: a systematic review and meta-analysis

Carlos Areia, Christopher Biggs, Mauro Santos, Neal Thurley, Stephen Gerry, Lionel Tarassenko, Peter Watkinson, Sarah Vollam
2021 Critical Care  
There was also no statistically significant association with reduced mortality (RR 0.48; 95% CI 0.18–1.29) and hospital length of stay (mean difference, MD − 0.09; 95% CI − 0.43 to 0.44).  ...  Our narrative findings suggested that alarms should be adjusted to minimise false alarms and promote rapid clinical action in response to deterioration. PROSPERO Registration number: CRD42020188633.  ...  Acknowledgements We would like to acknowledge Marco Pimentel for his support in designing the research question and Louise Young for her support in the refinement of search terms definitions.  ... 
doi:10.1186/s13054-021-03766-4 pmid:34583742 pmcid:PMC8477465 fatcat:obnrf6holzepld5wed5h5nhxsy

Systematic acquisition of audio classes for elevator surveillance

Regunathan Radhakrishnan, Ajay Divakaran, Amir Said, John G. Apostolopoulos
2005 Image and Video Communications and Processing 2005  
Based on the observation that the banging audio class and non-neutral speech class are indicative of suspicous events in the elevator data set, we are able to detect all of the suspicious activities without  ...  We use our time series analysis framework proposed in5 to low-level features extracted from the audio of an elevator surveillance content to perform an inlier/outlier based temporal segmentation.  ...  Of the chosen audio classes, we found that the sound class for banging sound and the sound class of non-neutral speech are indicative of suspicious activity in elevators.  ... 
doi:10.1117/12.587814 dblp:conf/eiivcp/RadhakrishnanD05 fatcat:4xoqfxdeenas7fuzelgpybhgqa

Human activity localization via sequential change detection

Alexia Briassouli, Ioannis Kompatsiaris
2008 Proceeding of the 1st ACM international conference on Multimedia information retrieval - MIR '08  
attention to video analysis, event detection, tracking and surveillance.  ...  Today's rapid developments in digital media processing capabilities, and network speeds, make the dissemination of multimedia data extremely rapid and reliable, and have attracted significant research  ...  For this reason, once the frames where changes occur in a video are estimated, we cluster them, to decrease the number of redundant or false alarm events.  ... 
doi:10.1145/1460096.1460140 dblp:conf/mir/BriassouliK08 fatcat:stbhav7ncbfvro5uqysv2fqyhu

Detecting race conditions in large programs

Cormac Flanagan, Stephen N. Freund
2001 Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering - PASTE '01  
To keep the number of false alarms Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed  ...  Reducing spurious warnings: Since statically detecting race conditions is undecidable in general, rccjava is incomplete by design and may produce false alarms for certain programming idioms.  ...  In a previous paper [10] , we described rccjava, a static analysis tool that has successfully caught race conditions in a variety of small to medium-sized Java programs.  ... 
doi:10.1145/379605.379687 dblp:conf/paste/FlanaganF01 fatcat:zwlfe5swuzcarnqcmc7e4kvhlq

Speaker diarization of broadcast news in Albayzin 2010 evaluation campaign

Martin Zelenák, Henrik Schulz, Javier Hernando
2012 EURASIP Journal on Audio, Speech, and Music Processing  
In this article, we present the evaluation results for the task of speaker diarization of broadcast news, which was part of the Albayzin 2010 evaluation campaign of language and speech technologies.  ...  The evaluation data consists of a subset of the Catalan broadcast news database recorded from the 3/24 TV channel.  ...  The authors would like to thank the organizers of the FALA 2010 workshop for their effort and also the participants for the help with the system descriptions.  ... 
doi:10.1186/1687-4722-2012-19 fatcat:wpkbmzqnajbwpnf7poi4d3qx54

The processing of biologically plausible and implausible forms in American Sign Language: evidence for perceptual tuning

Diogo Almeida, David Poeppel, David Corina
2015 Language, Cognition and Neuroscience  
deprivation may shape the neuronal mechanisms underlying the analysis of complex human form.  ...  The data demonstrate that the perceptual tuning that underlies the discrimination of language and non-language information is not limited to spoken languages but extends to languages expressed in the visual  ...  This work was conducted at the University of Maryland College, where DA and DP worked at that time.  ... 
doi:10.1080/23273798.2015.1100315 pmid:27135041 pmcid:PMC4849140 fatcat:u6pmgbvtwzbx3gsp5ieqabcw3m

Software Security Static Analysis False Alerts Handling Approaches

Aymen Akremi
2021 International Journal of Advanced Computer Science and Applications  
False Positive Alerts (FPA), generated by Static Analyzers Tools (SAT), reduce the effectiveness of the automatic code review, letting them be underused in practice.  ...  Researchers conduct a lot of tests to improve SAT accuracy while keeping FPA at a lower rate. They use different simulated and production datasets to validate their proposed methods.  ...  I SEARCH KEYWORDS CATEGORIES Category Number Keywords 1 defects, bugs, faults 2 false alerts, false warnings, false alarms 3 static analysis, source code analysis, automatic static bugs detection 4 filtering  ... 
doi:10.14569/ijacsa.2021.0121180 fatcat:4fvjpsfemfg7hprrqg3apzr7di

Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration

Alexandra Czarlinska, Deepa Kundur
2008 IEEE transactions on multimedia  
We show that the test statistic of the chi-squared detector is equivalent to that of a robust (non-parametric) detector and that this simple algorithm performs well on indoor surveillance sequences and  ...  We show that the scalar sensor error can be controlled through cluster-head checking and appropriate selection of cluster size .  ...  Analysis of such attacks is generally complicated by considerations of the type of scalar sensor involved, such as temperature, sound or motion.  ... 
doi:10.1109/tmm.2008.922775 fatcat:xdh4a4nibrd6vpcshvu6uyean4

Table of contents

2014 2014 International Conference on Informatics, Electronics & Vision (ICIEV)  
Design and Performance Analysis of A Dual-band Microstrip Asymmetry Analysis of Breast Thermograms using BM3D Technique and Statistical Texture Features 244 A Fuzzy Neuro Approach to Identify Diarrhea  ...  Detection in the Context of Bangladesh 337 Lip Contour Extraction Based on K-means Clustering Segmentation Using Different Color Planes 341 Analysis and improvement of Si integrated on-chip  ...  Implementation of vision based intelligent home automation and security system. 436 Analysis of the local frequency spectrum for the chirp signal 439 An Review of the e-JIKEI Network: Security camera system  ... 
doi:10.1109/iciev.2014.6850868 fatcat:y4gdctlg3zgajc3ge3drl6itcy

Non-Invasive Detection of Vortex Street Cavitation

Francisco Botero, Adriana Milena Castro Peralta
2017 Ingeniería y Universidad  
</p><p><strong>Conclusion:</strong> A non-intrusive monitoring approach along with a statistical indicator were implemented to allow the diagnosis of such phenomena.</p>  ...  It is based on the cyclostationary analysis of the airborne noise radiated by the collapsing bubbles.  ...  A special expression of gratitude is conveyed to the staff of the LMH.  ... 
doi:10.11144/javeriana.iyu21-2.ndvs fatcat:2vxwnjldjbft3dwklxscetd5lq

Anomaly Detection in Computer Networks: A State-of-the-Art Review

Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi
2014 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
sorts of network everyday.  ...  In this paper, we review and evaluate the state-of-the-art studies on the problem of anomaly detection in computer networks.  ...  Another static analysis solution is depicted in [34] , were the authors aimed at utilizing statistical approach to solve the problem of malware detection using static analysis.  ... 
doi:10.22667/jowua.2014.12.31.029 dblp:journals/jowua/BaddarMM14 fatcat:26leecvy35awtgnot4w3hlvb7i

Attack Classification Schema for Smart City WSNs

Victor Garcia-Font, Carles Garrigues, Helena Rifà-Pous
2017 Sensors  
We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.  ...  However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s17040771 pmid:28379192 pmcid:PMC5422044 fatcat:olgdxixisjg7tbxcu6to74k7gy

Multisensor Wireless System for Eccentricity and Bearing Fault Detection in Induction Motors

Ehsan Tarkesh Esfahani, Shaocheng Wang, V. Sundararajan
2014 IEEE/ASME transactions on mechatronics  
The faults of interest are static and dynamic air-gap eccentricity, bearing damage and their combinations.  ...  The proposed wireless system can distinguish a faulty motor from a healthy motor with a probability of 99.9% of correct detection and less than 0.1% likelihood of false alarm.  ...  Most work focuses on motor current signature analysis because the method is non-invasive, convenient and can yield information on a variety of faults [3] .  ... 
doi:10.1109/tmech.2013.2260865 fatcat:62svhngvdbgvdpwgo477hbzegu
« Previous Showing results 1 — 15 out of 7,281 results