Results 1 - 10
of
1,835
Anomalous Behavior in the Massive Schwinger Model
, 1996
"... We evaluate the chiral condensate and Polyakov loop in two-dimensional QED with a fermion of an arbitrary mass (m). We find discontinuous m dependence in the chiral condensate and anomalous temperature dependence in Polyakov loops when the vacuum angle θ∼π and m=O(e). These nonperturbative phenomena ..."
Abstract
- Add to MetaCart
We evaluate the chiral condensate and Polyakov loop in two-dimensional QED with a fermion of an arbitrary mass (m). We find discontinuous m dependence in the chiral condensate and anomalous temperature dependence in Polyakov loops when the vacuum angle θ∼π and m=O(e). These nonperturbative
An intrusion-detection model
- IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract
-
Cited by 639 (0 self)
- Add to MetaCart
of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular
Online Dominant and Anomalous Behavior Detection in Videos
"... We present a novel approach for video parsing and si-multaneous online learning of dominant and anomalous behaviors in surveillance videos. Dominant behaviors are those occurring frequently in videos and hence, usually do not attract much attention. They can be characterized by different complexitie ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
We present a novel approach for video parsing and si-multaneous online learning of dominant and anomalous behaviors in surveillance videos. Dominant behaviors are those occurring frequently in videos and hence, usually do not attract much attention. They can be characterized by different
Anomaly Detection: A Survey
, 2007
"... Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and c ..."
Abstract
-
Cited by 540 (5 self)
- Add to MetaCart
and anomalous behavior. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. For each category, we provide a basic anomaly detection technique, and then show how the different existing techniques
A survey on visual surveillance of object motion and behaviors
- IEEE Transactions on Systems, Man and Cybernetics
, 2004
"... Abstract—Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux stat ..."
Abstract
-
Cited by 439 (6 self)
- Add to MetaCart
statistics and congestion analysis, detection of anomalous behaviors, and interactive surveillance using multiple cameras, etc. In general, the processing framework of visual surveillance in dynamic scenes includes the following stages: modeling of environments, detection of motion, classification of moving
An Explanation of Anomalous Behavior in Models of Political Participation
"... This paper characterizes behavior with “noisy” decision making for models of political interaction characterized by simultaneous binary decisions. Applications include: voting participation games, candidate entry, the volunteer's dilemma, and collective action problems with a contribution thres ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
This paper characterizes behavior with “noisy” decision making for models of political interaction characterized by simultaneous binary decisions. Applications include: voting participation games, candidate entry, the volunteer's dilemma, and collective action problems with a contribution
ANOMALOUS BEHAVIOR OF LIQUIDS IN ISOLATED CONTACT WITH SOLIDS t
, 1970
"... Anomalous liquid behavior is viewed as a result of an increase in surface tension in isolated capillaries. Using a derived prime equation for this change several phenomena are treated including the strength of liquid bridges between solids, the lowering of vapor pressure, increased solubility, and a ..."
Abstract
- Add to MetaCart
Anomalous liquid behavior is viewed as a result of an increase in surface tension in isolated capillaries. Using a derived prime equation for this change several phenomena are treated including the strength of liquid bridges between solids, the lowering of vapor pressure, increased solubility
ANOMALOUS BEHAVIOR OF THE HALL EFFECT IN III-V HEYEROSTRUCTURES
, 2000
"... The Hall effect and magnetoresistance were measured in the InAs/GaAs heterostructure at temperatures from 300 K down to 3 K, in a magnetic field range from 0.01 to 1.5 T. The anomalous magnetic field dependence of the Hall coefficient in the InAs/GaAs heterostructure in magnetic fields below 0.1 T ..."
Abstract
- Add to MetaCart
The Hall effect and magnetoresistance were measured in the InAs/GaAs heterostructure at temperatures from 300 K down to 3 K, in a magnetic field range from 0.01 to 1.5 T. The anomalous magnetic field dependence of the Hall coefficient in the InAs/GaAs heterostructure in magnetic fields below 0
Anomalous behavior of water inside the SecY translocon
"... The heterotrimeric SecY translocon complex is required for the cotranslational assembly of membrane proteins in bacteria and archaea. The insertion of transmembrane (TM) segments during nascent-chain passage through the translocon is generally viewed as a simple partitioning process between the wate ..."
Abstract
- Add to MetaCart
effect [Öjemalm K, et al. (2011) Proc Natl Acad Sci USA 108(31):E359–E364]. However, the apparent partitioning solvation parameter is less than one-half the value expected for simple bulk partitioning, suggesting that the water in the translocon departs from bulk behavior. To examine the state of water
j Defining Anomalous Behavior for Phase Change Memory
"... Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, cost- and power-efficient alternative for DRAM. However, a PCM memory ce ..."
Abstract
- Add to MetaCart
Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, cost- and power-efficient alternative for DRAM. However, a PCM memory cell has a limited endurance of 10 7 − 10 8 writes, resulting in an ideal lifetime of only a few years which can be reduced further due to the non-uniform distribution of write traffic to the main memory. Wear leveling algorithms have been proposed to ensure uniform distribution of traffic to the main memory. However, this limited write endurance poses an easy to exploit loophole for attackers to bring the system down. A malicious application can perform multiple writes to the same memory location (PCM cell) and quickly cross the endurance limit for the cell. We show that wear leveling algorithms, while meeting their
Results 1 - 10
of
1,835