Sciweavers

839 search results - page 34 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
15 years 6 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...
95
Voted
MSWIM
2005
ACM
15 years 6 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
93
Voted
DAWAK
2003
Springer
15 years 5 months ago
Automatic Detection of Structural Changes in Data Warehouses
Data Warehouses provide sophisticated tools for analyzing complex data online, in particular by aggregating data along dimensions spanned by master data. Changes to these master da...
Johann Eder, Christian Koncilia, Dieter Mitsche
95
Voted
GIS
2010
ACM
14 years 10 months ago
A data stream-based evaluation framework for traffic information systems
Traffic information systems based on mobile, in-car sensor technology are a challenge for data management systems as a huge amount of data has to be processed in real-time. Data m...
Sandra Geisler, Christoph Quix, Stefan Schiffer
IEAAIE
2004
Springer
15 years 5 months ago
OIDM: Online Interactive Data Mining
Facilitated by the achievements of various data mining techniques, both academic research and industrial applications are using data mining tools to explore knowledge from various ...
Qijun Chen, Xindong Wu, Xingquan Zhu