Sciweavers

184 search results - page 5 / 37
» Data Mining Techniques Based on Grey System Theories for Tim...
Sort
View
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 2 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 2 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
14 years 2 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
ACSW
2006
13 years 9 months ago
Event sequence mining to develop profiles for computer forensic investigation purposes
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators ca...
Tamas Abraham
ISBI
2004
IEEE
14 years 8 months ago
Simultaneous Estimation of Kinetic Parameters and the Input Function from DCE-MRI Data: Theory and Simulation
DCE-MRI is a noninvasive functional imaging technique capable of assessing tumor microvasculature clinically. Major limitations associated with conventional region-of-interest (RO...
Zhu Han, Z. Jane Wang, K. J. Ray Liu, Yue Wang