Sciweavers

433 search results - page 56 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
COMAD
2009
13 years 9 months ago
Categorizing Concepts for Detecting Drifts in Stream
Mining evolving data streams for concept drifts has gained importance in applications like customer behavior analysis, network intrusion detection, credit card fraud detection. Se...
Sharanjit Kaur, Vasudha Bhatnagar, Sameep Mehta, S...
RAID
1999
Springer
14 years 1 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
ASC
2008
13 years 9 months ago
Info-fuzzy algorithms for mining dynamic data streams
Most data mining algorithms assume static behavior of the incoming data. In the real world, the situation is different and most continuously collected data streams are generated by...
Lior Cohen, Gil Avrahami, Mark Last, Abraham Kande...
KI
2007
Springer
14 years 2 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signiď¬...
Dieter Fox
VRST
2006
ACM
14 years 2 months ago
P2P Network for very large virtual environment
The ever increasing speed of Internet connections has led to a point where it is actually possible for every end user to seamlessly share data on Internet. Peer-To-Peer (P2P) netw...
Romain Cavagna, Christian Bouville, Jér&oci...