• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,835
Next 10 →

Anomalous Behavior in the Massive Schwinger Model

by Yutaka Hosotani, Ramón Rodríguez , 1996
"... We evaluate the chiral condensate and Polyakov loop in two-dimensional QED with a fermion of an arbitrary mass (m). We find discontinuous m dependence in the chiral condensate and anomalous temperature dependence in Polyakov loops when the vacuum angle θ∼π and m=O(e). These nonperturbative phenomena ..."
Abstract - Add to MetaCart
We evaluate the chiral condensate and Polyakov loop in two-dimensional QED with a fermion of an arbitrary mass (m). We find discontinuous m dependence in the chiral condensate and anomalous temperature dependence in Polyakov loops when the vacuum angle θ∼π and m=O(e). These nonperturbative

An intrusion-detection model

by Dorothy E. Denning - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract - Cited by 639 (0 self) - Add to MetaCart
of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular

Online Dominant and Anomalous Behavior Detection in Videos

by Mehrsan Javan Roshtkhari, Martin D. Levine
"... We present a novel approach for video parsing and si-multaneous online learning of dominant and anomalous behaviors in surveillance videos. Dominant behaviors are those occurring frequently in videos and hence, usually do not attract much attention. They can be characterized by different complexitie ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
We present a novel approach for video parsing and si-multaneous online learning of dominant and anomalous behaviors in surveillance videos. Dominant behaviors are those occurring frequently in videos and hence, usually do not attract much attention. They can be characterized by different

Anomaly Detection: A Survey

by Varun Chandola, Arindam Banerjee, Vipin Kumar , 2007
"... Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and c ..."
Abstract - Cited by 540 (5 self) - Add to MetaCart
and anomalous behavior. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. For each category, we provide a basic anomaly detection technique, and then show how the different existing techniques

A survey on visual surveillance of object motion and behaviors

by Weiming Hu, Tieniu Tan, Liang Wang, Steve Maybank - IEEE Transactions on Systems, Man and Cybernetics , 2004
"... Abstract—Visual surveillance in dynamic scenes, especially for humans and vehicles, is currently one of the most active research topics in computer vision. It has a wide spectrum of promising applications, including access control in special areas, human identification at a distance, crowd flux stat ..."
Abstract - Cited by 439 (6 self) - Add to MetaCart
statistics and congestion analysis, detection of anomalous behaviors, and interactive surveillance using multiple cameras, etc. In general, the processing framework of visual surveillance in dynamic scenes includes the following stages: modeling of environments, detection of motion, classification of moving

An Explanation of Anomalous Behavior in Models of Political Participation

by Jacob K. Goeree, Charles A. Holt
"... This paper characterizes behavior with “noisy” decision making for models of political interaction characterized by simultaneous binary decisions. Applications include: voting participation games, candidate entry, the volunteer's dilemma, and collective action problems with a contribution thres ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
This paper characterizes behavior with “noisy” decision making for models of political interaction characterized by simultaneous binary decisions. Applications include: voting participation games, candidate entry, the volunteer's dilemma, and collective action problems with a contribution

ANOMALOUS BEHAVIOR OF LIQUIDS IN ISOLATED CONTACT WITH SOLIDS t

by William J. O’brien , 1970
"... Anomalous liquid behavior is viewed as a result of an increase in surface tension in isolated capillaries. Using a derived prime equation for this change several phenomena are treated including the strength of liquid bridges between solids, the lowering of vapor pressure, increased solubility, and a ..."
Abstract - Add to MetaCart
Anomalous liquid behavior is viewed as a result of an increase in surface tension in isolated capillaries. Using a derived prime equation for this change several phenomena are treated including the strength of liquid bridges between solids, the lowering of vapor pressure, increased solubility

ANOMALOUS BEHAVIOR OF THE HALL EFFECT IN III-V HEYEROSTRUCTURES

by Z Dziuba , M Górska , J Marczewskib , T Przesławskib , K Rεgińskib°' , 2000
"... The Hall effect and magnetoresistance were measured in the InAs/GaAs heterostructure at temperatures from 300 K down to 3 K, in a magnetic field range from 0.01 to 1.5 T. The anomalous magnetic field dependence of the Hall coefficient in the InAs/GaAs heterostructure in magnetic fields below 0.1 T ..."
Abstract - Add to MetaCart
The Hall effect and magnetoresistance were measured in the InAs/GaAs heterostructure at temperatures from 300 K down to 3 K, in a magnetic field range from 0.01 to 1.5 T. The anomalous magnetic field dependence of the Hall coefficient in the InAs/GaAs heterostructure in magnetic fields below 0

Anomalous behavior of water inside the SecY translocon

by Matthias Heydenb, Ana-nicoleta Bondarc, Douglas J. Tobiasb, Stephen H. Whitea
"... The heterotrimeric SecY translocon complex is required for the cotranslational assembly of membrane proteins in bacteria and archaea. The insertion of transmembrane (TM) segments during nascent-chain passage through the translocon is generally viewed as a simple partitioning process between the wate ..."
Abstract - Add to MetaCart
effect [Öjemalm K, et al. (2011) Proc Natl Acad Sci USA 108(31):E359–E364]. However, the apparent partitioning solvation parameter is less than one-half the value expected for simple bulk partitioning, suggesting that the water in the translocon departs from bulk behavior. To examine the state of water

j Defining Anomalous Behavior for Phase Change Memory

by R ]nv Hdm, Siddhartha Chhabra, Yan Solihin
"... Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, cost- and power-efficient alternative for DRAM. However, a PCM memory ce ..."
Abstract - Add to MetaCart
Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, cost- and power-efficient alternative for DRAM. However, a PCM memory cell has a limited endurance of 10 7 − 10 8 writes, resulting in an ideal lifetime of only a few years which can be reduced further due to the non-uniform distribution of write traffic to the main memory. Wear leveling algorithms have been proposed to ensure uniform distribution of traffic to the main memory. However, this limited write endurance poses an easy to exploit loophole for attackers to bring the system down. A malicious application can perform multiple writes to the same memory location (PCM cell) and quickly cross the endurance limit for the cell. We show that wear leveling algorithms, while meeting their
Next 10 →
Results 1 - 10 of 1,835
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University