Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
This paper presents the PLANMINE sequence mining algorithm to extract patterns of events that predict failures in databases of plan executions. New techniques were needed because p...
Mohammed Javeed Zaki, Neal Lesh, Mitsunori Ogihara
The application of the wavelet transform in image processing is most frequently based on a separable transform. Lines and columns in an image are treated independently and the bas...
Pier Luigi Dragotti, Vladan Velisavljevic, Martin ...
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
We present a new method for attaching data to digital audio-visual (AV) documents. Our method is steganographic, i.e., a secondary data stream is integrated or embedded into a giv...