Sciweavers

5414 search results - page 51 / 1083
» Exploratory Model Building
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 28 days ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CVPR
2009
IEEE
15 years 3 months ago
D - Clutter: Building object model library from unsupervised segmentation of cluttered scenes
Autonomous systems which learn and utilize a limited visual vocabulary have wide spread applications. Enabling such systems to segment a set of cluttered scenes into objects is ...
Chandra Kambhamettu, Dimitris N. Metaxas, Gowri So...
SIGSOFT
2011
ACM
13 years 3 months ago
Modeling a distributed intrusion detection system using collaborative building blocks
Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks...
Linda Ariani Gunawan, Michael Vogel, Frank Alexand...
BPM
2007
Springer
125views Business» more  BPM 2007»
14 years 2 months ago
What Makes Process Models Understandable?
Abstract. Despite that formal and informal quality aspects are of significant importance to business process modeling, there is only little empirical work reported on process mode...
Jan Mendling, Hajo A. Reijers, Jorge Cardoso