Adaptive load allocation for combining Anomaly Detectors using controlled skips
M. Berger, F. Erlacher, C. Sommer, F. Dressler, in: 2014 International Conference on Computing, Networking and Communications (ICNC), 2014.
Download
No fulltext has been uploaded.
Conference Paper
| Published
| English
Author
Berger, Mario;
Erlacher, Felix;
Sommer, ChristophLibreCat ;
Dressler, Falko
Publishing Year
Proceedings Title
2014 International Conference on Computing, Networking and Communications (ICNC)
ISBN
LibreCat-ID
Cite this
Berger M, Erlacher F, Sommer C, Dressler F. Adaptive load allocation for combining Anomaly Detectors using controlled skips. In: 2014 International Conference on Computing, Networking and Communications (ICNC). ; 2014. doi:10.1109/iccnc.2014.6785438
Berger, M., Erlacher, F., Sommer, C., & Dressler, F. (2014). Adaptive load allocation for combining Anomaly Detectors using controlled skips. In 2014 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/iccnc.2014.6785438
@inproceedings{Berger_Erlacher_Sommer_Dressler_2014, title={Adaptive load allocation for combining Anomaly Detectors using controlled skips}, DOI={10.1109/iccnc.2014.6785438}, booktitle={2014 International Conference on Computing, Networking and Communications (ICNC)}, author={Berger, Mario and Erlacher, Felix and Sommer, Christoph and Dressler, Falko}, year={2014} }
Berger, Mario, Felix Erlacher, Christoph Sommer, and Falko Dressler. “Adaptive Load Allocation for Combining Anomaly Detectors Using Controlled Skips.” In 2014 International Conference on Computing, Networking and Communications (ICNC), 2014. https://doi.org/10.1109/iccnc.2014.6785438.
M. Berger, F. Erlacher, C. Sommer, and F. Dressler, “Adaptive load allocation for combining Anomaly Detectors using controlled skips,” in 2014 International Conference on Computing, Networking and Communications (ICNC), 2014.
Berger, Mario, et al. “Adaptive Load Allocation for Combining Anomaly Detectors Using Controlled Skips.” 2014 International Conference on Computing, Networking and Communications (ICNC), 2014, doi:10.1109/iccnc.2014.6785438.