An Evaluation of Monitoring Algorithms for Access Anomaly Detection (Classic Reprint)

An Evaluation of Monitoring Algorithms for Access Anomaly Detection (Classic Reprint)
Categories: Computers, Monitor
10.5 CAD
Buy Now

Excerpt from An Evaluation of Monitoring Algorithms for Access Anomaly Detection

Initially we do not consider orderings imposed by other inter-thread synchronization, such as events, barriers, and message passing; this restriction is removed in Section 4. Because this basic program model is limited to fork-join constructs, all partial order execution graph are series-parallel graphs.

About the Publisher

Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com

This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.