Sciweavers

188 search results - page 32 / 38
» Anomaly Detection Using the Dempster-Shafer Method
Sort
View
DATAMINE
2008
219views more  DATAMINE 2008»
13 years 7 months ago
Correlating burst events on streaming stock market data
Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
KDD
2010
ACM
161views Data Mining» more  KDD 2010»
13 years 9 months ago
Mass estimation and its applications
This paper introduces mass estimation—a base modelling mechanism in data mining. It provides the theoretical basis of mass and an efficient method to estimate mass. We show that...
Kai Ming Ting, Guang-Tong Zhou, Fei Tony Liu, Jame...
DASFAA
1999
IEEE
118views Database» more  DASFAA 1999»
13 years 12 months ago
Materialized View Maintenance Using Version Numbers
A data warehouse stores materialized views over data from one or more sources in order to provide fast access to the integrated data, regardless of the availability of the data so...
Tok Wang Ling, Eng Koon Sze
ICANN
2007
Springer
13 years 11 months ago
Topology Aware Internet Traffic Forecasting Using Neural Networks
Forecasting Internet traffic is receiving an increasing attention from the computer networks domain. Indeed, by improving this task efficient traffic engineering and anomaly detect...
Paulo Cortez, Miguel Rio, Pedro Sousa, Miguel Roch...