...
| Data Sets with Events | Data Sets with no Events | ||||||
---|---|---|---|---|---|---|---|---|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a77fa7e7c92743b7-13b762c9-4e4b43c6-90d6b155-b5d0a8565da51f9fa5ae9d18"><ac:plain-text-body><![CDATA[ | IEPM | [[rar | ^datasets-with-events.rar]] 3.4 MB, [[zip | ^datasets-with-events.zip]] 3.6 MB | [[rar | ^datasets-with-no-events.rar]] 3.3 MB, [[zip | ^datasets-with-no-events.zip]] 3.5 MB | ]]></ac:plain-text-body></ac:structured-macro> |
...
The technical report titled "A performance evaluation of anomaly detection algorithms for Internet Paths" is available here.The range of input parameters used for the comparative analysis are summarized below. Note that each algorithm requires a different set of parameterswill be available soon.
Input/Tuning parameters
Plateau Algorithm (PL)
...