Sciweavers

110 search results - page 22 / 22
» kdd 2005
Sort
View
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 10 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
ICDCSW
2005
IEEE
14 years 3 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
ICIP
2005
IEEE
14 years 3 months ago
HMM-based motion recognition system using segmented PCA
In this paper, we propose a novel technique for modelbased recognition of complex object motion trajectories using Hidden Markov Models (HMM). We build our models on Principal Com...
Faisal I. Bashir, Wei Qu, Ashfaq A. Khokhar, Dan S...
KES
2005
Springer
14 years 3 months ago
A SVM Regression Based Approach to Filling in Missing Values
In KDD procedure, to fill in missing data typically requires a very large investment of time and energy - often 80% to 90% of a data analysis project is spent in making the data re...
Honghai Feng, Chen Guoshun, Yin Cheng, Bingru Yang...
JNCA
2007
136views more  JNCA 2007»
13 years 9 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos