Sciweavers

405 search results - page 9 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
PERVASIVE
2011
Springer
12 years 11 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
CORR
2008
Springer
192views Education» more  CORR 2008»
13 years 7 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...
ACSAC
2004
IEEE
14 years 9 days ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
JIPS
2010
216views more  JIPS 2010»
13 years 3 months ago
Fingerprint Detection Using Canny Filter and DWT, a New Approach
This paper proposes two new methods to detect the fingerprints of different persons based on one-dimensional and two-dimensional discrete wavelet transformations (DWTs). Recent lit...
Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M....
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 9 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...