Sciweavers

77 search results - page 15 / 16
» Anomaly detection algorithms in logs of process aware system...
Sort
View
CIDR
2007
111views Algorithms» more  CIDR 2007»
13 years 8 months ago
Moirae: History-Enhanced Monitoring
In this paper, we investigate the benefits and challenges of integrating history into a near-real-time monitoring system; and present a general purpose continuous monitoring engi...
Magdalena Balazinska, YongChul Kwon, Nathan Kuchta...
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 7 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
12 years 10 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 7 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
HT
2009
ACM
14 years 1 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer