Sciweavers

1702 search results - page 193 / 341
» Hidden Pattern Statistics
Sort
View
ACSAC
2003
IEEE
15 years 7 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
145
Voted
SBACPAD
2003
IEEE
180views Hardware» more  SBACPAD 2003»
15 years 7 months ago
New Parallel Algorithms for Frequent Itemset Mining in Very Large Databases
Frequent itemset mining is a classic problem in data mining. It is a non-supervised process which concerns in finding frequent patterns (or itemsets) hidden in large volumes of d...
Adriano Veloso, Wagner Meira Jr., Srinivasan Parth...
PAKDD
2009
ACM
171views Data Mining» more  PAKDD 2009»
15 years 7 months ago
Detecting Abnormal Events via Hierarchical Dirichlet Processes
Abstract. Detecting abnormal event from video sequences is an important problem in computer vision and pattern recognition and a large number of algorithms have been devised to tac...
Xian-Xing Zhang, Hua Liu, Yang Gao, Derek Hao Hu
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
15 years 6 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
128
Voted
WIDM
1999
ACM
15 years 6 months ago
Warehousing and Mining Web Logs
Analyzing Web Logs for usage and access trends can not only provide important information to web site developers and administrators, but also help in creating adaptive web sites. ...
Karuna P. Joshi, Anupam Joshi, Yelena Yesha, Raghu...