Sciweavers

50 search results - page 7 / 10
» Business process impact visualization and anomaly detection
Sort
View
USENIX
2008
13 years 9 months ago
Wide-Scale Data Stream Management
This paper describes Mortar, a distributed stream processing platform for building very large queries across federated systems (enterprises, grids, datacenters, testbeds). Nodes i...
Dionysios Logothetis, Ken Yocum
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 7 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
VL
1996
IEEE
162views Visual Languages» more  VL 1996»
13 years 11 months ago
Interactive Authoring of Multimedia Documents
As multimedia applications spread widely, it is crucial for programming and design support systems to handle "time" in multimedia documents effectively and flexibly. This...
Junehwa Song, Michelle Y. Kim, G. Ramalingam, Raym...
INFOCOM
2005
IEEE
14 years 1 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
ICIP
2010
IEEE
13 years 5 months ago
An integer programming approach to visual compliance
Visual compliance has emerged as a new paradigm to ensure that employees comply with processes and policies in a business context [1]. In this paper, we focus on videos from retai...
Lei Ding, Quanfu Fan, Sharath Pankanti