Sciweavers

345 search results - page 8 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
12 years 3 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
ICDM
2007
IEEE
199views Data Mining» more  ICDM 2007»
14 years 1 months ago
Discovering Structural Anomalies in Graph-Based Data
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 11 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
PAKDD
2007
ACM
137views Data Mining» more  PAKDD 2007»
14 years 1 months ago
Contrast Set Mining Through Subgroup Discovery Applied to Brain Ischaemina Data
Abstract. Contrast set mining aims at finding differences between different groups. This paper shows that a contrast set mining task can be transformed to a subgroup discovery ta...
Petra Kralj, Nada Lavrac, Dragan Gamberger, Antoni...
JCIT
2008
165views more  JCIT 2008»
13 years 7 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen