Sciweavers

1217 search results - page 136 / 244
» On compressing frequent patterns
Sort
View
TON
2008
102views more  TON 2008»
15 years 4 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
AIR
2000
91views more  AIR 2000»
15 years 4 months ago
PlanMine: Predicting Plan Failures Using Sequence Mining
This paper presents the PLANMINE sequence mining algorithm to extract patterns of events that predict failures in databases of plan executions. New techniques were needed because p...
Mohammed Javeed Zaki, Neal Lesh, Mitsunori Ogihara
ICIP
2002
IEEE
16 years 5 months ago
Directional wavelet transforms and frames
The application of the wavelet transform in image processing is most frequently based on a separable transform. Lines and columns in an image are treated independently and the bas...
Pier Luigi Dragotti, Vladan Velisavljevic, Martin ...
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
15 years 9 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
ICMCS
2000
IEEE
80views Multimedia» more  ICMCS 2000»
15 years 8 months ago
Perceptually Transparent Attachment of Content-Based Data to Audio-Visual Documents
We present a new method for attaching data to digital audio-visual (AV) documents. Our method is steganographic, i.e., a secondary data stream is integrated or embedded into a giv...
Frank Kurth