Sciweavers

7587 search results - page 1332 / 1518
» Network Analysis and Visualisation
Sort
View
VLDB
2005
ACM
153views Database» more  VLDB 2005»
14 years 9 months ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu
VLDB
2009
ACM
165views Database» more  VLDB 2009»
14 years 9 months ago
Online pairing of VoIP conversations
This paper answers the following question; given a multiplicity of evolving 1-way conversations, can a machine or an algorithm discern the conversational pairs in an online fashio...
Michail Vlachos, Aris Anagnostopoulos, Olivier Ver...
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
14 years 9 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
14 years 9 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
PODS
2006
ACM
122views Database» more  PODS 2006»
14 years 9 months ago
Space- and time-efficient deterministic algorithms for biased quantiles over data streams
Skew is prevalent in data streams, and should be taken into account by algorithms that analyze the data. The problem of finding "biased quantiles"-- that is, approximate...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
« Prev « First page 1332 / 1518 Last » Next »