Sciweavers

2032 search results - page 379 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
VIZSEC
2005
Springer
15 years 3 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
HICSS
2005
IEEE
175views Biometrics» more  HICSS 2005»
15 years 3 months ago
Causal Reasoning Engine: An Explanation-Based Approach to Syndromic Surveillance
1 Quickly detecting an unexpected pathogen can save many lives. In cases of bioterrorism or naturally occurring epidemics, accurate diagnoses may not be made until much of the popu...
Benjamin B. Perry, Tim Van Allen
75
Voted
GIS
2010
ACM
14 years 8 months ago
Constrained free space diagrams: a tool for trajectory analysis
We propose a new and powerful tool for the analysis of trajectories, which in particular allows for more temporally aware analyses. Time plays an important role in the analysis of ...
Kevin Buchin, Maike Buchin, Joachim Gudmundsson
95
Voted
BMCBI
2004
150views more  BMCBI 2004»
14 years 9 months ago
Cross-species comparison significantly improves genome-wide prediction of cis-regulatory modules in Drosophila
Background: The discovery of cis-regulatory modules in metazoan genomes is crucial for understanding the connection between genes and organism diversity. It is important to quanti...
Saurabh Sinha, Mark D. Schroeder, Ulrich Unnerstal...
CCS
2009
ACM
15 years 4 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...