Sciweavers

6318 search results - page 128 / 1264
» Data Leakage Detection
Sort
View
VLDB
2007
ACM
179views Database» more  VLDB 2007»
16 years 2 months ago
Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data
Market analysis is a representative data analysis process with many applications. In such an analysis, critical numerical measures, such as profit and sales, fluctuate over time a...
Xiaolei Li, Jiawei Han
SECPERU
2006
IEEE
15 years 8 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
NC
1998
106views Neural Networks» more  NC 1998»
15 years 3 months ago
Auditory Stimulus Discrimination from MEG Data
We consider Magnetoencephalographic (MEG) data in a signal detection framework. Our data set consists of responses evoked by the voiced syllables /b
Tuomas J. Lukka, Bernd Schoner, Alec Marantz
IJRR
2010
214views more  IJRR 2010»
14 years 11 months ago
Object Recognition in 3D Point Clouds Using Web Data and Domain Adaptation
Over the last years, object detection has become a more and more active field of research in robotics. An important problem in object detection is the need for sufficient labeled ...
Kevin Lai, Dieter Fox
CVPR
1996
IEEE
1457views Computer Vision» more  CVPR 1996»
16 years 4 months ago
Edge Detection and Ridge Detection with Automatic Scale Selection
When computing descriptors of image data, the type of information that can be extracted may be strongly dependent on the scales at which the image operators are applied. This arti...
Tony Lindeberg