Sciweavers

703 search results - page 110 / 141
» Graph-based anomaly detection
Sort
View
FLAIRS
2003
13 years 10 months ago
Automated Data Fusion and Situation Assessment in Space Systems
Spacecraft are key components of military operations and everyday life. To achieve space situation awareness, human operators must monitor large numbers of parameters. During off-...
Mark L. Hanson, Paul G. Gonsalves
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
13 years 9 months ago
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Affinity functions are the core components in negative selection to discriminate self from non-self. It has been shown that affinity functions such as the r-contiguous distance an...
Thomas Stibor
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 8 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
JIIS
1998
97views more  JIIS 1998»
13 years 8 months ago
Knowledge Mining With VxInsight: Discovery Through Interaction
The explosive growth in the availability of information is overwhelming traditional information management systems. Although individual pieces of information have become easy to ï¬...
George S. Davidson, Bruce Hendrickson, David K. Jo...
ICCVG
2010
13 years 6 months ago
A New Method for ECG Signal Feature Extraction
Abstract. The paper concentrates on electrocardiographic (ECG) signal analysis for the sake of acquiring proper heartbeat datasets for further detection and recognition of anomalie...
Adam Szczepanski, Khalid Saeed, Alois Ferscha