Sciweavers

103 search results - page 3 / 21
» Anomaly Detection through Registration
Sort
View
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
14 years 18 days ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick
JNCA
2007
136views more  JNCA 2007»
13 years 6 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos
TR
2010
204views Hardware» more  TR 2010»
13 years 1 months ago
Anomaly Detection Through a Bayesian Support Vector Machine
This paper investigates the use of a one-class support vector machine algorithm to detect the onset of system anomalies, and trend output classification probabilities, as a way to ...
Vasilis A. Sotiris, Peter W. Tse, Michael Pecht
PERCOM
2007
ACM
14 years 6 months ago
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection
Macro programming a distributed system, such as a sensor network, is the ability to specify application tasks at a global level while relying on compiler-like software to translat...
Marco Mamei, Radhika Nagpal
SOCIALCOM
2010
13 years 4 months ago
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and...
Yuhong Liu, Yan (Lindsay) Sun