Sciweavers

23 search results - page 2 / 5
» Fraud Detection through Graph-Based User Behavior Modeling
Sort
View
KAIS
2007
120views more  KAIS 2007»
13 years 4 months ago
Capabilities of outlier detection schemes in large datasets, framework and methodologies
Abstract. Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some importa...
Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W...
SEKE
2004
Springer
13 years 10 months ago
Automated Assistance for Eliciting User Expectations
People often use software for mundane tasks and expect it to be dependable enough for their needs. Unfortunately, the incomplete and imprecise specifications of such everyday sof...
Orna Raz, Rebecca B. Buchheit, Mary Shaw, Philip K...
ACSAC
2004
IEEE
13 years 8 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
CAISE
2011
Springer
12 years 8 months ago
Supporting Dynamic, People-Driven Processes through Self-learning of Message Flows
Abstract. Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Pr...
Christoph Dorn, Schahram Dustdar
UIST
1997
ACM
13 years 8 months ago
Flexible Conflict Detection and Management in Collaborative Applications
This paper presents a comprehensive model for dealing with semantic conflicts in applications, and the implementation of this model in a toolkit for collaborative systems. Conflic...
W. Keith Edwards