Sciweavers

77 search results - page 9 / 16
» Anomaly detection algorithms in logs of process aware system...
Sort
View
CORR
2011
Springer
213views Education» more  CORR 2011»
13 years 2 months ago
Adapting to Non-stationarity with Growing Expert Ensembles
Forecasting sequences by expert ensembles generally assumes stationary or near-stationary processes; however, in complex systems and many real-world applications, we are frequentl...
Cosma Rohilla Shalizi, Abigail Z. Jacobs, Aaron Cl...
RAID
1999
Springer
13 years 11 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
CAISE
2006
Springer
13 years 9 months ago
Incremental Workflow Mining for Process Flexibility
Abstract. Incremental workflow mining is a technique for automatically deriving a process model from the on-going executions of a process. This way, the process model becomes more ...
Ekkart Kindler, Vladimir Rubin, Wilhelm Schäf...
IPPS
2010
IEEE
13 years 5 months ago
A scalable algorithm for maintaining perpetual system connectivity in dynamic distributed systems
We investigate the problem of maintaining a topology with small degree as well as small diameter in a dynamic distributed system such that the system always stays connected and pr...
Tarun Bansal, Neeraj Mittal