Sciweavers

912 search results - page 170 / 183
» Anomaly
Sort
View
VLDB
2005
ACM
196views Database» more  VLDB 2005»
14 years 1 months ago
Summarizing and Mining Inverse Distributions on Data Streams via Dynamic Inverse Sampling
Emerging data stream management systems approach the challenge of massive data distributions which arrive at high speeds while there is only small storage by summarizing and minin...
Graham Cormode, S. Muthukrishnan, Irina Rozenbaum
CINQ
2004
Springer
189views Database» more  CINQ 2004»
14 years 28 days ago
Employing Inductive Databases in Concrete Applications
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
14 years 27 days ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
KDD
2004
ACM
161views Data Mining» more  KDD 2004»
14 years 27 days ago
ANN quality diagnostic models for packaging manufacturing: an industrial data mining case study
World steel trade becomes more competitive every day and new high international quality standards and productivity levels can only be achieved by applying the latest computational...
Nicolás de Abajo, Alberto B. Diez, Vanesa L...
VIZSEC
2004
Springer
14 years 26 days ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah