Sciweavers

357 search results - page 51 / 72
» Anomaly Detection Using Process Mining
Sort
View
MOBIHOC
2007
ACM
14 years 9 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
EDM
2010
121views Data Mining» more  EDM 2010»
13 years 8 months ago
Identifying Students' Inquiry Planning Using Machine Learning
This research investigates the detection of student meta-cognitive planning processes in real-time using log tracing techniques. We use fine and coarse-grained data distillation, i...
Orlando Montalvo, Ryan Shaun Joazeiro de Baker, Mi...
USENIX
2008
13 years 12 months ago
Wide-Scale Data Stream Management
This paper describes Mortar, a distributed stream processing platform for building very large queries across federated systems (enterprises, grids, datacenters, testbeds). Nodes i...
Dionysios Logothetis, Ken Yocum
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
13 years 11 months ago
Mining Medical Specialist Billing Patterns for Health Service Management
This paper presents an application of association rule mining in compliance in the context of health service management. There are approximately 500 million transactions processed...
Yin Shan, David Jeacocke, D. Wayne Murray, Alison ...
CCS
2007
ACM
14 years 3 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...