Sciweavers

1085 search results - page 143 / 217
» Active Mining in a Distributed Setting
Sort
View
82
Voted
ISPAN
2005
IEEE
15 years 6 months ago
P2P Architecture for Self-Atomic Memory
We propose an architecture for self-adjusting and self-healing atomic memory in highly dynamic systems exploiting peer-to-peer (p2p) techniques. Our approach, named SAM, brings to...
Emmanuelle Anceaume, Maria Gradinariu, Vincent Gra...
KDD
2009
ACM
347views Data Mining» more  KDD 2009»
16 years 1 months ago
Network anomaly detection based on Eigen equation compression
This paper addresses the issue of unsupervised network anomaly detection. In recent years, networks have played more and more critical roles. Since their outages cause serious eco...
Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata,...
95
Voted
KDD
2005
ACM
193views Data Mining» more  KDD 2005»
16 years 1 months ago
An approach to spacecraft anomaly detection problem using kernel feature space
Development of advanced anomaly detection and failure diagnosis technologies for spacecraft is a quite significant issue in the space industry, because the space environment is ha...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
119
Voted
TCS
2008
15 years 15 days ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
117
Voted
KDD
2008
ACM
119views Data Mining» more  KDD 2008»
16 years 1 months ago
SAIL: summation-based incremental learning for information-theoretic clustering
Information-theoretic clustering aims to exploit information theoretic measures as the clustering criteria. A common practice on this topic is so-called INFO-K-means, which perfor...
Junjie Wu, Hui Xiong, Jian Chen