An Evaluation of Monitoring Algorithms for Access Anomaly Detection (Classic Reprint)

An Evaluation of Monitoring Algorithms for Access Anomaly Detection (Classic Reprint)

Hardback (27 Oct 2018)

Not available for sale

Includes delivery to the United States

Out of stock

This service is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Publisher's Synopsis

Excerpt from An Evaluation of Monitoring Algorithms for Access Anomaly Detection

Initially we do not consider orderings imposed by other inter-thread synchronization, such as events, barriers, and message passing; this restriction is removed in Section 4. Because this basic program model is limited to fork-join constructs, all partial order execution graph are series-parallel graphs.

About the Publisher

Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com

This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.

Book information

ISBN: 9780267403387
Publisher: Fb&c Ltd
Imprint: Forgotten Books
Pub date:
Number of pages: 44
Weight: 220g
Height: 229mm
Width: 152mm
Spine width: 6mm