Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
This research investigates the detection of student meta-cognitive planning processes in real-time using log tracing techniques. We use fine and coarse-grained data distillation, i...
Orlando Montalvo, Ryan Shaun Joazeiro de Baker, Mi...
This paper describes Mortar, a distributed stream processing platform for building very large queries across federated systems (enterprises, grids, datacenters, testbeds). Nodes i...
This paper presents an application of association rule mining in compliance in the context of health service management. There are approximately 500 million transactions processed...
Yin Shan, David Jeacocke, D. Wayne Murray, Alison ...
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...