Sciweavers

1274 search results - page 114 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
EUROSSC
2007
Springer
15 years 10 months ago
Escalation:  Complex Event Detection in Wireless Sensor Networks
We present a new approach for the detection of complex events in Wireless Sensor Networks. Complex events are sets of data points that correspond to interesting or unusual patterns...
Michael Zoumboulakis, George Roussos
KI
2007
Springer
15 years 10 months ago
Relational Exploration - Reconciling Plato and Aristotle
Abstract. We provide an interactive method for knowledge acquisition combining approaches from description logic and formal concept analysis. Based on present data, hypothetical ru...
Sebastian Rudolph
PRL
2010
205views more  PRL 2010»
14 years 10 months ago
Mining outliers with faster cutoff update and space utilization
It is desirable to find unusual data objects by Ramaswamy et al's distance-based outlier definition because only a metric distance function between two objects is required. It...
Chi-Cheong Szeto, Edward Hung
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
15 years 9 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
SIGSOFT
2007
ACM
16 years 4 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno