Sciweavers

1274 search results - page 127 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KAIS
2010
139views more  KAIS 2010»
15 years 2 months ago
Periodic subgraph mining in dynamic networks
In systems of interacting entities such as social networks, interactions that occur regularly typically correspond to significant, yet often infrequent and hard to detect, interact...
Mayank Lahiri, Tanya Y. Berger-Wolf
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 4 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
ICRA
2007
IEEE
151views Robotics» more  ICRA 2007»
15 years 10 months ago
Sensor Analysis for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks
— This paper presents a sensor analysis based fault detection approach (which we call SAFDetection) that is used to monitor tightly-coupled multi-robot team tasks. Our approach a...
Xingyan Li, Lynne E. Parker
DSN
2008
IEEE
15 years 10 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
146
Voted
SISAP
2010
IEEE
132views Data Mining» more  SISAP 2010»
15 years 2 months ago
SHIATSU: annotating your videos the easy way!
In this demonstration we present SHIATSU, an automatic semantic-based video tagging system which relies on shot boundary detection and hierarchical annotation. More in details, in...
Ilaria Bartolini, Corrado Romani