Sciweavers

21 search results - page 2 / 5
» Distributed online anomaly detection in high-content screeni...
Sort
View
BMCBI
2008
93views more  BMCBI 2008»
13 years 5 months ago
Using iterative cluster merging with improved gap statistics to perform online phenotype discovery in the context of high-throug
Background: The recent emergence of high-throughput automated image acquisition technologies has forever changed how cell biologists collect and analyze data. Historically, the in...
Zheng Yin, Xiaobo Zhou, Chris Bakal, Fuhai Li, You...
EDBT
2004
ACM
94views Database» more  EDBT 2004»
14 years 5 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
13 years 12 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 5 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
CCGRID
2006
IEEE
13 years 11 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu