Sciweavers

1274 search results - page 44 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 8 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
HPDC
2008
IEEE
14 years 3 months ago
Issues in applying data mining to grid job failure detection and diagnosis
As grid computation systems become larger and more complex, manually diagnosing failures in jobs becomes impractical. Recently, machine-learning techniques have been proposed to d...
Lakshmikant Shrinivas, Jeffrey F. Naughton
GPB
2010
231views Solid Modeling» more  GPB 2010»
13 years 6 months ago
Mining Gene Expression Profiles: An Integrated Implementation of Kernel Principal Component Analysis and Singular Value Decompos
The detection of genes that show similar profiles under different experimental conditions is often an initial step in inferring the biological significance of such genes. Visualiz...
Ferran Reverter, Esteban Vegas, Pedro Sánch...
COMSNETS
2012
199views more  COMSNETS 2012»
12 years 4 months ago
Varanus: More-with-less fault localization in data centers
Abstract—Detecting and localizing performance faults is crucial for operating large enterprise data centers. This problem is relatively straightforward to solve if each entity (a...
Vaishali P. Sadaphal, Maitreya Natu, Harrick M. Vi...
TSMC
2011
228views more  TSMC 2011»
13 years 3 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...