Sciweavers

1274 search results - page 125 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
BPM
2006
Springer
166views Business» more  BPM 2006»
15 years 7 months ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
SDM
2012
SIAM
452views Data Mining» more  SDM 2012»
13 years 6 months ago
Density-based Projected Clustering over High Dimensional Data Streams
Clustering of high dimensional data streams is an important problem in many application domains, a prominent example being network monitoring. Several approaches have been lately ...
Irene Ntoutsi, Arthur Zimek, Themis Palpanas, Peer...
CIKM
2008
Springer
15 years 6 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
ADAPTIVE
2007
Springer
15 years 10 months ago
Case-Based Recommendation
Abstract. Data Mining, or Knowledge Discovery as it is also known, is becoming increasingly useful in a wide variety of applications. In the following paper, we look at its use in ...
Barry Smyth
ICIP
2010
IEEE
15 years 2 months ago
Video anomaly detection in spatiotemporal context
Compared to other approaches that analyze object trajectories, we propose to detect anomalous video events at three levels considering spatiotemporal context of video objects, i.e...
Fan Jiang, Junsong Yuan, Sotirios A. Tsaftaris, Ag...