Sciweavers

912 search results - page 6 / 183
» Anomaly
Sort
View
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
13 years 5 months ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han
PAKDD
2005
ACM
133views Data Mining» more  PAKDD 2005»
14 years 29 days ago
An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning
This paper proposes a novel anomaly detection system for spacecrafts based on data mining techniques. It constructs a nonlinear probabilistic model w.r.t. behavior of a spacecraft ...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
DSN
2008
IEEE
14 years 1 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 9 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
COLING
2008
13 years 9 months ago
Anomalies in the WordNet Verb Hierarchy
The WordNet verb hierarchy is tested, with a view to improving the performance of its applications, revealing topological anomalies and casting doubt on its semantic categories. E...
Tom Richens