Sciweavers

110 search results - page 22 / 22
» kdd 2005
Sort
View
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 6 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
ICDCSW
2005
IEEE
13 years 11 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
ICIP
2005
IEEE
13 years 11 months ago
HMM-based motion recognition system using segmented PCA
In this paper, we propose a novel technique for modelbased recognition of complex object motion trajectories using Hidden Markov Models (HMM). We build our models on Principal Com...
Faisal I. Bashir, Wei Qu, Ashfaq A. Khokhar, Dan S...
KES
2005
Springer
13 years 11 months ago
A SVM Regression Based Approach to Filling in Missing Values
In KDD procedure, to fill in missing data typically requires a very large investment of time and energy - often 80% to 90% of a data analysis project is spent in making the data re...
Honghai Feng, Chen Guoshun, Yin Cheng, Bingru Yang...
JNCA
2007
136views more  JNCA 2007»
13 years 5 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos