Sciweavers

839 search results - page 82 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
93
Voted
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
16 years 1 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider
137
Voted
CIKM
2008
Springer
15 years 2 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
86
Voted
BTW
2005
Springer
104views Database» more  BTW 2005»
15 years 6 months ago
Maintaining Nonparametric Estimators over Data Streams
Abstract: An effective processing and analysis of data streams is of utmost importance for a plethora of emerging applications like network monitoring, traffic management, and fi...
Björn Blohsfeld, Christoph Heinz, Bernhard Se...
INFOSCALE
2006
ACM
15 years 6 months ago
PENS: an algorithm for density-based clustering in peer-to-peer systems
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and v...
Mei Li, Guanling Lee, Wang-Chien Lee, Anand Sivasu...
KES
2008
Springer
15 years 18 days ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...