Sciweavers

121 search results - page 7 / 25
» Anomalous trajectory patterns detection
Sort
View
KES
2008
Springer
13 years 7 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
BIOSURVEILLANCE
2007
Springer
14 years 1 months ago
A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases
Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
Yanna Shen, Gregory F. Cooper
GEOINFORMATICA
2008
73views more  GEOINFORMATICA 2008»
13 years 7 months ago
Reporting Leaders and Followers among Trajectories of Moving Point Objects
Abstract. Widespread availability of location aware devices (such as GPS receivers) promotes capture of detailed movement trajectories of people, animals, vehicles and other moving...
Mattias Andersson, Joachim Gudmundsson, Patrick La...
IDA
2007
Springer
13 years 7 months ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder
ANCS
2007
ACM
13 years 11 months ago
High-speed detection of unsolicited bulk emails
We propose a Progressive Email Classifier (PEC) for highspeed classification of message patterns that are commonly associated with unsolicited bulk email (UNBE). PEC is designed t...
Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn Liu, Mich...