Sciweavers

255 search results - page 41 / 51
» Timing Anomalies Reloaded
Sort
View
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
14 years 3 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
DIM
2009
ACM
14 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
KR
1998
Springer
14 years 2 months ago
AOL: A logic of Acting, Sensing, Knowing, and Only Knowing
This work is motivated by the existence of two useful but quite different knowledge representation formalisms, the situation calculus due to McCarthy, and the logic OL of only kno...
Gerhard Lakemeyer, Hector J. Levesque
VL
1996
IEEE
162views Visual Languages» more  VL 1996»
14 years 2 months ago
Interactive Authoring of Multimedia Documents
As multimedia applications spread widely, it is crucial for programming and design support systems to handle "time" in multimedia documents effectively and flexibly. This...
Junehwa Song, Michelle Y. Kim, G. Ramalingam, Raym...
CHI
1996
ACM
14 years 2 months ago
LifeLines: Visualizing Personal Histories
LifeLines provide a general visualization environment for personal histories that can be applied to medical and court records, professional histories and other types of biographic...
Catherine Plaisant, Brett Milash, Anne Rose, Seth ...