Sciweavers

839 search results - page 75 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
SIGIR
2009
ACM
15 years 7 months ago
Web derived pronunciations for spoken term detection
Indexing and retrieval of speech content in various forms such as broadcast news, customer care data and on-line media has gained a lot of interest for a wide range of application...
Dogan Can, Erica Cooper, Arnab Ghoshal, Martin Jan...
99
Voted
RAID
1999
Springer
15 years 4 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
ICSE
1998
IEEE-ACM
15 years 4 months ago
An Approach to Large-Scale Collection of Application Usage Data Over the Internet
Empirical evaluation of software systems in actual usage situations is critical in software engineering. Prototyping, beta testing, and usability testing are widely used to refine...
David M. Hilbert, David F. Redmiles
VIS
2004
IEEE
148views Visualization» more  VIS 2004»
16 years 1 months ago
Detection and Visualization of Anomalous Structures in Molecular Dynamics Simulation Data
In this article we explore techniques to detect and visualize features in data from molecular dynamics (MD) simulations. Although the techniques proposed are general, we focus on ...
John Wilkins, Kaden Hazzard, Raghu Machiraju, Same...
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
15 years 6 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...