Sciweavers

1265 search results - page 123 / 253
» Better Burst Detection
Sort
View
KDD
1998
ACM
200views Data Mining» more  KDD 1998»
14 years 2 months ago
Fast Computation of 2-Dimensional Depth Contours
"Oneperson's noise is another person's signal." For manyapplications, including the detection of credit card frauds and the monitoringof criminal activities in...
Theodore Johnson, Ivy Kwok, Raymond T. Ng
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
14 years 5 days ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...
DAGSTUHL
2006
13 years 11 months ago
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
Michael Hilker, Christoph Schommer
IADIS
2004
13 years 11 months ago
Recognizing Article Errors Based on the Three Head Words
In this paper, we present a statistical model for detecting article errors, which Japanese learners of English often make in English writing. The model detects article errors base...
Ryo Nagata, Fumito Masui, Atsuo Kawai, Naoki Isu
DATAMINE
2010
189views more  DATAMINE 2010»
13 years 10 months ago
A game-theoretic framework to identify overlapping communities in social networks
In this paper, we introduce a game-theoretic framework to address the community detection problem based on the structures of social networks. We formulate the dynamics of community...
Wei Chen, Zhenming Liu, Xiaorui Sun, Yajun Wang