Sciweavers

2071 search results - page 240 / 415
» Behaviour Management in Database Applications
Sort
View
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
14 years 11 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
KDD
2003
ACM
192views Data Mining» more  KDD 2003»
14 years 11 months ago
Efficient elastic burst detection in data streams
Burst detection is the activity of finding abnormal aggregates in data streams. Such aggregates are based on sliding windows over data streams. In some applications, we want to mo...
Yunyue Zhu, Dennis Shasha
SIGMOD
2005
ACM
100views Database» more  SIGMOD 2005»
14 years 11 months ago
Events on the edge
The emergence of large-scale receptor-based systems has enabled applications to execute complex business logic over data generated from monitoring the physical world. An important...
Shariq Rizvi, Shawn R. Jeffery, Sailesh Krishnamur...
WWW
2010
ACM
14 years 5 months ago
Predicting positive and negative links in online social networks
We study online social networks in which relationships can be either positive (indicating relations such as friendship) or negative (indicating relations such as opposition or ant...
Jure Leskovec, Daniel P. Huttenlocher, Jon M. Klei...
GIS
2009
ACM
14 years 5 months ago
Topological relations from metric refinements
Naive Geography’s premise “Topology matters, metric refines” calls for metric properties that provide opportunities for finergrained distinctions than the purely qualitative...
Max J. Egenhofer, Matthew P. Dube