Sciweavers

249 search results - page 29 / 50
» A nonself space approach to network anomaly detection
Sort
View
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 7 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
15 years 11 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
14 years 11 months ago
Less is More: Compact Matrix Decomposition for Large Sparse Graphs
Given a large sparse graph, how can we find patterns and anomalies? Several important applications can be modeled as large sparse graphs, e.g., network traffic monitoring, resea...
Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Falo...
KDD
2001
ACM
1203views Data Mining» more  KDD 2001»
15 years 10 months ago
Application of Data Mining Techniques for Medical Image Classification
Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents some experiments for tumou...
Maria-Luiza Antonie, Osmar R. Zaïane, Alexand...
ICIP
2008
IEEE
15 years 11 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...